#VU6393 Memory leak in FreeBSD - CVE-2017-1081
Published: April 27, 2017 / Updated: April 27, 2017
FreeBSD
FreeBSD Foundation
Description
The vulnerability allows a remote attacker to cause denial of service conditions.
The vulnerability exists due to an error within ipfilter(4) implementation, when processing specially crafted fragmented packets and the packet filter is configured to perform stateful packet inspection, using the "keep state" or "keep frags" rule options. A remote attacker can send a series of specially crafted fragmented packets to vulnerable system and trigger kernel panic and system reboot.
Successful exploitation of the vulnerability may allow an attacker to perform a denial of service (DoS) attack.
Remediation
https://security.FreeBSD.org/patches/SA-17:04/ipfilter.patch
https://security.FreeBSD.org/patches/SA-17:04/ipfilter.patch.asc