vulnerability
FreeBSD: VID-30ce591c-947b-11ea-92ab-00163e433440 (CVE-2020-7454): FreeBSD -- Insufficient packet length validation in libalias
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | May 12, 2020 | Dec 10, 2025 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 12, 2020
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
Problem Description: libalias(3) packet handlers do not properly validate the packet length before accessing the protocol headers. As a result, if a libalias(3) module does not properly validate the packet length before accessing the protocol header, it is possible for an out of bound read or write condition to occur. Impact: A malicious attacker could send specially constructed packets that exploit the lack of validation allowing the attacker to read or write memory either from the kernel (for the in-kernel NAT implementation) or from the process space for natd (for the userspace implementation).
Solutions
freebsd-upgrade-base-12_1-release-p5freebsd-upgrade-base-11_4-release-p1freebsd-upgrade-base-11_3-release-p9
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.