First published: Tue Feb 18 2020(Updated: )
In FreeBSD 12.0-RELEASE before 12.0-RELEASE-p13, a missing check in the ipsec packet processor allows reinjection of an old packet to be accepted by the ipsec endpoint. Depending on the higher-level protocol in use over ipsec, this could allow an action to be repeated.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =12.0 | |
FreeBSD Kernel | =12.0-p1 | |
FreeBSD Kernel | =12.0-p10 | |
FreeBSD Kernel | =12.0-p11 | |
FreeBSD Kernel | =12.0-p12 | |
FreeBSD Kernel | =12.0-p2 | |
FreeBSD Kernel | =12.0-p3 | |
FreeBSD Kernel | =12.0-p4 | |
FreeBSD Kernel | =12.0-p6 | |
FreeBSD Kernel | =12.0-p7 | |
FreeBSD Kernel | =12.0-p8 | |
FreeBSD Kernel | =12.0-p9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-5613 is considered to be moderate due to the potential for repeated actions over an IPsec connection.
To fix CVE-2019-5613, upgrade your FreeBSD installation to 12.0-RELEASE-p13 or later.
CVE-2019-5613 affects FreeBSD versions 12.0 through 12.0-RELEASE-p12.
CVE-2019-5613 is a vulnerability in the IPsec packet processor that allows for the reinjection of old packets.
CVE-2019-5613 could allow an attacker to repeat actions that are processed over an IPsec connection, potentially leading to unauthorized operations.