#VU40881 Input validation error in FreeBSD Foundation products - CVE-2015-1414
Published: February 27, 2015 / Updated: August 9, 2020
pfsense
Debian Linux
FreeBSD
Rubicon Communications
Debian
FreeBSD Foundation
Description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (crash) via a crafted IGMP packet, which triggers an incorrect size calculation and allocation of insufficient memory.
Remediation
External links
- http://www.debian.org/security/2015/dsa-3175
- http://www.securityfocus.com/bid/72777
- http://www.securitytracker.com/id/1031798
- https://kc.mcafee.com/corporate/index?page=content&id=SB10107
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15:04.igmp.asc
- https://www.pfsense.org/security/advisories/pfSense-SA-15_02.igmp.asc