Executive Summary

Informations
NameCVE-2017-1081First vendor Publication2018-04-10
VendorCveLast vendor Modification2019-10-09

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score7.8Attack RangeNetwork
Cvss Impact Score6.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1081

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os887

Nessus® Vulnerability Scanner

DateDescription
2017-05-30Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_51d1282d420e11e782c514dae9d210b8.nasl - Type : ACT_GATHER_INFO
2017-05-05Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_sa-17-04_ipfilter.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/98089
FREEBSD https://www.freebsd.org/security/advisories/FreeBSD-SA-17:04.ipfilter.asc
SECTRACK http://www.securitytracker.com/id/1038369

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
DateInformations
2019-10-10 05:19:39
  • Multiple Updates
2019-03-21 12:03:56
  • Multiple Updates
2019-03-20 12:08:02
  • Multiple Updates
2019-03-19 12:08:32
  • Multiple Updates
2018-11-24 12:05:17
  • Multiple Updates
2018-10-12 12:05:07
  • Multiple Updates
2018-05-18 17:19:02
  • Multiple Updates
2018-04-12 09:18:51
  • Multiple Updates
2018-04-10 17:19:16
  • First insertion