Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2018-6918 CVE-2018-6917 |
CWE-ID | CWE-835 CWE-190 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
FreeBSD Operating systems & Components / Operating system |
Vendor | FreeBSD Foundation |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU11528
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-6918
CWE-ID:
CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to the length field of the option header does not count the size of the option header itself and pointer/offset mistakes in the handling of IPv4 options. A remote attacker can trigger infinite loop and cause the service to crash.
Install update from vendor's website.
Vulnerable software versionsFreeBSD: 11.0 - 11.1
CPE2.3https://www.freebsd.org/security/advisories/FreeBSD-SA-18:05.ipsec.asc
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11529
Risk: Low
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-6917
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to insufficient validation of user-provided font parameters. A remote attacker can trigger integer overflow and gain root privileges.
Install update from vendor's website.
Vulnerable software versionsFreeBSD: 11.0 - 11.1
CPE2.3https://www.freebsd.org/security/advisories/FreeBSD-SA-18:04.vt.asc
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.