Vulnerability Description
The (1) IPv6 and (2) ATM ioctl request handlers in the kernel in FreeBSD 8.3 through 9.2-STABLE do not validate SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR, and SIOCSIFNETMASK requests, which allows local users to perform link-layer actions, cause a denial of service (panic), or possibly gain privileges via a crafted application.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 8.3 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/54861
- http://svnweb.freebsd.org/base?view=revision&revision=255442Patch
- http://www.debian.org/security/2013/dsa-2769
- http://www.freebsd.org/security/advisories/FreeBSD-SA-13:12.ifioctl.ascVendor Advisory
- http://secunia.com/advisories/54861
- http://svnweb.freebsd.org/base?view=revision&revision=255442Patch
- http://www.debian.org/security/2013/dsa-2769
- http://www.freebsd.org/security/advisories/FreeBSD-SA-13:12.ifioctl.ascVendor Advisory
FAQ
What is CVE-2013-5691?
CVE-2013-5691 is a vulnerability with a CVSS score of 6.9 (MEDIUM). The (1) IPv6 and (2) ATM ioctl request handlers in the kernel in FreeBSD 8.3 through 9.2-STABLE do not validate SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR, and SIOCSIFNETMASK requests, which allows l...
How severe is CVE-2013-5691?
CVE-2013-5691 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5691?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.