Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-0E06013E-6A06-11EA-92AB-00163E433440 (CVE-2020-7451): FreeBSD -- TCP IPv6 SYN cache kernel information disclosure

Back to Search

FreeBSD: VID-0E06013E-6A06-11EA-92AB-00163E433440 (CVE-2020-7451): FreeBSD -- TCP IPv6 SYN cache kernel information disclosure

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
03/19/2020
Created
03/24/2020
Added
03/20/2020
Modified
03/20/2020

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From VID-0E06013E-6A06-11EA-92AB-00163E433440:

Problem Description:

When a TCP server transmits or retransmits a TCP SYN-ACK segment

over IPv6, the Traffic Class field is not initialized. This also

applies to challenge ACK segments, which are sent in response to

received RST segments during the TCP connection setup phase.

Impact:

For each TCP SYN-ACK (or challenge TCP-ACK) segment sent over IPv6,

one byte of kernel memory is transmitted over the network.

Solution(s)

  • freebsd-upgrade-base-11_3-release-p7
  • freebsd-upgrade-base-12_1-release-p3

References

  • freebsd-upgrade-base-11_3-release-p7
  • freebsd-upgrade-base-12_1-release-p3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;