Executive Summary

Informations
NameCVE-2019-5598First vendor Publication2019-05-15
VendorCveLast vendor Modification2019-06-11

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

In FreeBSD 11.3-PRERELEASE before r345378, 12.0-STABLE before r345377, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in pf does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet allowing a maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5598

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os12

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/108395
CONFIRM https://security.netapp.com/advisory/ntap-20190611-0001/
MISC http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD...
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:06.pf.asc
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.synacktiv.com/posts/systems/icmp-reachable.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2019-07-24 12:05:15
  • Multiple Updates
2019-06-12 05:19:17
  • Multiple Updates
2019-05-21 21:19:32
  • Multiple Updates
2019-05-21 09:18:53
  • Multiple Updates
2019-05-16 00:19:18
  • Multiple Updates
2019-05-15 21:19:36
  • First insertion