{ "CVE_data_meta" : { "ASSIGNER" : "secteam@freebsd.org", "DATE_PUBLIC" : "2018-09-27T00:00:00", "ID" : "CVE-2018-6925", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "FreeBSD", "version" : { "version_data" : [ { "version_value" : "11.2 before 11.2-RELEASE-p4" }, { "version_value" : "11.1 before 11.1-RELEASE-p15" }, { "version_value" : "10.x before 10.4-RELEASE-p13" } ] } } ] }, "vendor_name" : "FreeBSD" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "In FreeBSD before 11.2-STABLE(r338986), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338985), and 10.4-RELEASE-p13, due to improper maintenance of IPv6 protocol control block flags through various failure paths, an unprivileged authenticated local user may be able to cause a NULL pointer dereference causing the kernel to crash." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "Denial of service" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://www.flexera.com/company/secunia-research/advisories/SR-2018-21.html", "refsource" : "MISC", "url" : "https://www.flexera.com/company/secunia-research/advisories/SR-2018-21.html" }, { "name" : "https://security.FreeBSD.org/advisories/FreeBSD-EN-18:11.listen.asc", "refsource" : "CONFIRM", "url" : "https://security.FreeBSD.org/advisories/FreeBSD-EN-18:11.listen.asc" } ] } }