CVE-2019-5597
high-risk
Published 2019-05-15
In FreeBSD 11.3-PRERELEASE and 12.0-STABLE before r347591, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in the pf IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of the first packet allowing maliciously crafted IPv6 packets to cause a crash or potentially bypass the packet filter.
Do I need to act?
~
2.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (11)
Affected Vendors
References (12)
Third Party Advisory
http://packetstormsecurity.com/files/152933/FreeBSD-Security-Advisory-FreeBSD-SA...
Third Party Advisory
http://packetstormsecurity.com/files/152933/FreeBSD-Security-Advisory-FreeBSD-SA...
52
/ 100
high-risk
Severity
31/34 · Critical
Exploitability
5/34 · Minimal
Exposure
16/34 · Moderate