Vulnerability Description
The SYN cache (syncache) and SYN cookie (syncookie) mechanism in FreeBSD 4.5 and earlier allows remote attackers to cause a denial of service (crash) (1) via a SYN packet that is accepted using syncookies that causes a null pointer to be referenced for the socket's TCP options, or (2) by killing and restarting a process that listens on the same socket, which does not properly clear the old inpcb pointer on restart.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 4.5 |
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:20.syncache.asc
- http://www.iss.net/security_center/static/8873.php
- http://www.iss.net/security_center/static/8875.phpPatchVendor Advisory
- http://www.osvdb.org/6046
- http://www.securityfocus.com/bid/4524PatchVendor Advisory
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:20.syncache.asc
- http://www.iss.net/security_center/static/8873.php
- http://www.iss.net/security_center/static/8875.phpPatchVendor Advisory
- http://www.osvdb.org/6046
- http://www.securityfocus.com/bid/4524PatchVendor Advisory
FAQ
What is CVE-2002-0518?
CVE-2002-0518 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The SYN cache (syncache) and SYN cookie (syncookie) mechanism in FreeBSD 4.5 and earlier allows remote attackers to cause a denial of service (crash) (1) via a SYN packet that is accepted using syncoo...
How severe is CVE-2002-0518?
CVE-2002-0518 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0518?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.