In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference.
Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 15
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:-:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:p1:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:p2:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:p3:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:p4:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:p5:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:p6:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:13.5:p7:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:*
|
— | — |
|
Freebsd Freebsd
cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:*
|
— | — |