SB2017042701 - Remote DoS in FreeBSD ipfilter



SB2017042701 - Remote DoS in FreeBSD ipfilter

Published: April 27, 2017

Security Bulletin ID SB2017042701
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Memory leak (CVE-ID: CVE-2017-1081)

The vulnerability allows a remote attacker to cause denial of service conditions.

The vulnerability exists due to an error within ipfilter(4) implementation, when processing specially crafted fragmented packets and the packet filter is configured to perform stateful packet inspection, using the "keep state" or "keep frags" rule options. A remote attacker can send a series of specially crafted fragmented packets to vulnerable system and trigger kernel panic and system reboot.

Successful exploitation of the vulnerability may allow an attacker to perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.