cvelist/2018/6xxx/CVE-2018-6918.json

74 lines
2.2 KiB
JSON
Raw Normal View History

2018-02-12 11:02:18 -05:00
{
"CVE_data_meta" : {
"ASSIGNER" : "secteam@freebsd.org",
"DATE_PUBLIC" : "2018-04-04T00:00:00",
2018-02-12 11:02:18 -05:00
"ID" : "CVE-2018-6918",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "FreeBSD",
"version" : {
"version_data" : [
{
"version_value" : "All supported versions of FreeBSD."
}
]
}
}
]
},
"vendor_name" : "FreeBSD"
}
]
}
2018-02-12 11:02:18 -05:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, the length field of the ipsec option header does not count the size of the option header itself, causing an infinite loop when the length is zero. This issue can allow a remote attacker who is able to send an arbitrary packet to cause the machine to crash."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Kernel crash or denial of service"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "FreeBSD-SA-18:05",
"refsource" : "FREEBSD",
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:05.ipsec.asc"
2018-04-05 06:09:06 -04:00
},
2018-04-06 06:04:10 -04:00
{
"name" : "103666",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/103666"
},
2018-04-05 06:09:06 -04:00
{
"name" : "1040628",
"refsource" : "SECTRACK",
2018-04-05 06:09:06 -04:00
"url" : "http://www.securitytracker.com/id/1040628"
2018-02-12 11:02:18 -05:00
}
]
}
}