FKIE_CVE-2015-1417

Vulnerability from fkie_nvd - Published: 2017-07-25 18:29 - Updated: 2025-04-20 01:37
Summary
The inet module in FreeBSD 10.2x before 10.2-PRERELEASE, 10.2-BETA2-p2, 10.2-RC1-p1, 10.1x before 10.1-RELEASE-p16, 9.x before 9.3-STABLE, 9.3-RELEASE-p21, and 8.x before 8.4-STABLE, 8.4-RELEASE-p35 on systems with VNET enabled and at least 16 VNET instances allows remote attackers to cause a denial of service (mbuf consumption) via multiple concurrent TCP connections.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "0BF94E45-1825-4879-97B2-F6D47E597DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FDAAAAE0-04A9-45EE-84A5-B0F9AA88CBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p11:*:*:*:*:*:*",
              "matchCriteriaId": "EC296C23-F87E-4D07-A691-5F60FBDD2C0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p12:*:*:*:*:*:*",
              "matchCriteriaId": "2E180C26-D3BA-4403-B839-6EB61DF6F1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p13:*:*:*:*:*:*",
              "matchCriteriaId": "7DE87248-2195-4B14-A3BA-5A1EA64984C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p14:*:*:*:*:*:*",
              "matchCriteriaId": "1749FC97-2B9A-4D4D-A828-AD1F1AF564C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p15:*:*:*:*:*:*",
              "matchCriteriaId": "8D308C0D-53D0-454D-B271-AF97395FFC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p16:*:*:*:*:*:*",
              "matchCriteriaId": "F6ADC0E0-8E6D-4DE8-9029-7D8232BC5763",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p17:*:*:*:*:*:*",
              "matchCriteriaId": "0BA37A49-4992-405F-A307-B09688C90027",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p19:*:*:*:*:*:*",
              "matchCriteriaId": "57745709-9F5B-48DF-B8A3-3458347B3B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p2:*:*:*:*:*:*",
              "matchCriteriaId": "E61A036A-1841-43E6-8A0B-3E65C667924B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p20:*:*:*:*:*:*",
              "matchCriteriaId": "74ADA8DE-F5CE-4989-92A5-CF6D4E971B39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p21:*:*:*:*:*:*",
              "matchCriteriaId": "53F70236-B8CC-464B-BBFC-F0F448525710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p22:*:*:*:*:*:*",
              "matchCriteriaId": "0F6BF22F-2A3D-405E-A4B1-80D319B1AF7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p23:*:*:*:*:*:*",
              "matchCriteriaId": "3156D50D-C0AB-4FCA-A9F1-7150660C51E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p24:*:*:*:*:*:*",
              "matchCriteriaId": "6113CC6A-F651-4A16-9C92-7D4F9AD4DD48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p26:*:*:*:*:*:*",
              "matchCriteriaId": "EC306309-BCC1-4433-9FFB-AFBC7A633BDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p27:*:*:*:*:*:*",
              "matchCriteriaId": "677EED6C-57A0-4B72-8157-B0D3FC3E6D35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p3:*:*:*:*:*:*",
              "matchCriteriaId": "72FAAAB4-067E-4A17-9BCF-70E14DEC8150",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p30:*:*:*:*:*:*",
              "matchCriteriaId": "A1B300B4-418E-46CA-8A7F-2E03A67DDE5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p33:*:*:*:*:*:*",
              "matchCriteriaId": "60086A51-E85E-4EF9-9B26-8C198B7936AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p34:*:*:*:*:*:*",
              "matchCriteriaId": "50E9E793-6DAC-4A13-949E-26700F008ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p4:*:*:*:*:*:*",
              "matchCriteriaId": "378CB83A-F7CF-4926-A913-B30D701FAE70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p7:*:*:*:*:*:*",
              "matchCriteriaId": "44584A85-5243-4EDC-BA0B-96EA5E5E9347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p8:*:*:*:*:*:*",
              "matchCriteriaId": "E17FD4F8-3151-45A1-83E3-5ED52EEDF2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:8.4:p9:*:*:*:*:*:*",
              "matchCriteriaId": "5DDC89F0-5510-4863-8835-B760FFBD8639",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "A308448F-7FAD-4CAA-B204-94979A0055EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p1:*:*:*:*:*:*",
              "matchCriteriaId": "9D942069-86FD-4777-B144-27F68845510F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p10:*:*:*:*:*:*",
              "matchCriteriaId": "8BCB79FA-CF26-4DA9-BE6B-DB38F4BD76DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p12:*:*:*:*:*:*",
              "matchCriteriaId": "6937683B-ADC8-452E-BCD7-34ED8656D75E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p13:*:*:*:*:*:*",
              "matchCriteriaId": "0B50A898-C510-4582-8931-2820D2FFB646",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p16:*:*:*:*:*:*",
              "matchCriteriaId": "5016E4BB-D905-49BF-8B23-40DD9F9BC133",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p19:*:*:*:*:*:*",
              "matchCriteriaId": "C4009691-42D4-4E04-BA72-EAC9E30C30E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p2:*:*:*:*:*:*",
              "matchCriteriaId": "AC531D8E-31B3-48B1-8B79-85B9FB67CF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p20:*:*:*:*:*:*",
              "matchCriteriaId": "4B161FA9-E1A8-407B-80A9-9F57DF4E6932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p3:*:*:*:*:*:*",
              "matchCriteriaId": "B9D919A6-BBEC-416C-8FC0-5CA7B0191E82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p5:*:*:*:*:*:*",
              "matchCriteriaId": "22A2F317-2F1A-4D3F-8E31-B5ABFCEE2AAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p6:*:*:*:*:*:*",
              "matchCriteriaId": "179468E8-0FB7-4E1A-9002-AFC8753027AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p7:*:*:*:*:*:*",
              "matchCriteriaId": "CF8563F3-DD91-4272-B72D-08F66E2E44C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p8:*:*:*:*:*:*",
              "matchCriteriaId": "642BCA8F-6432-43D2-9E74-565CC71A9DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p9:*:*:*:*:*:*",
              "matchCriteriaId": "09003BFB-72FB-4F89-B62C-4A2505E60630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "794DB6C2-514F-4353-AC31-025D53FFC3FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p1:*:*:*:*:*:*",
              "matchCriteriaId": "55448583-DD8E-44FA-9033-CEB8E63FC2C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p10:*:*:*:*:*:*",
              "matchCriteriaId": "A238C1FE-D4D3-4EEC-ACBE-341B112123EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p12:*:*:*:*:*:*",
              "matchCriteriaId": "BABAD599-782F-4BFE-9EE2-0668ECAAC349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p15:*:*:*:*:*:*",
              "matchCriteriaId": "C263C188-EA00-4110-B9A5-16C0CD0F1DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p16:*:*:*:*:*:*",
              "matchCriteriaId": "75F93217-BCD4-4AD4-9621-49C83BA3FFD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p2:*:*:*:*:*:*",
              "matchCriteriaId": "5F2A6E84-E37B-4E21-BBD9-FDB878D53D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p3:*:*:*:*:*:*",
              "matchCriteriaId": "D5F7A00A-5A6B-46FA-8527-14917C50555A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p4:*:*:*:*:*:*",
              "matchCriteriaId": "466EA7B2-FBAF-4325-AD99-F5F4B0E5C0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EAD3F82B-E13C-40CE-BF65-4DA204FCDE93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p6:*:*:*:*:*:*",
              "matchCriteriaId": "23E2935E-7159-45A2-9164-978453F24BDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p7:*:*:*:*:*:*",
              "matchCriteriaId": "1B7F75CF-F808-4BD6-9A46-AA5C1989F740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p8:*:*:*:*:*:*",
              "matchCriteriaId": "3EC40899-2775-45B9-96C1-8A9E7FAB7A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p9:*:*:*:*:*:*",
              "matchCriteriaId": "A22BC7A2-BA8D-4C1D-A51A-7DF7EDEDDCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "C1C1DA92-2184-4FB0-8392-AF80E7D6EB2E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The inet module in FreeBSD 10.2x before 10.2-PRERELEASE, 10.2-BETA2-p2, 10.2-RC1-p1, 10.1x before 10.1-RELEASE-p16, 9.x before 9.3-STABLE, 9.3-RELEASE-p21, and 8.x before 8.4-STABLE, 8.4-RELEASE-p35 on systems with VNET enabled and at least 16 VNET instances allows remote attackers to cause a denial of service (mbuf consumption) via multiple concurrent TCP connections."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo inet en FreeBSD versi\u00f3n 10.2x anterior a 10.2-PRERELEASE,  versi\u00f3n 10.2-BETA2-p2, versi\u00f3n 10.2-RC1-p1, versi\u00f3n 10.1x anterior a 10.1-RELEASE-p16, versi\u00f3n 9.x anterior a 9.3-STABLE, versi\u00f3n 9.3-RELEASE-p21, y versi\u00f3n 8. x anterior a 8.4-ESTABLE, versi\u00f3n 8.4-RELEASE-p35 en sistemas con VNET habilitado y al menos 16 peticiones VNET permiten a los atacantes remotos causar una denegaci\u00f3n de servicio (consumo de mbuf) por medio de m\u00faltiples conexiones TCP concurrentes."
    }
  ],
  "id": "CVE-2015-1417",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-07-25T18:29:00.290",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/76112"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033111"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:15.tcp.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/76112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1033111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-15:15.tcp.asc"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…