Vulnerability Description
Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 9.1 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1031098
- https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A20.rtsold.ascPatch
- http://www.securitytracker.com/id/1031098
- https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A20.rtsold.ascPatch
FAQ
What is CVE-2014-3954?
CVE-2014-3954 is a vulnerability with a CVSS score of 10.0 (HIGH). Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a ro...
How severe is CVE-2014-3954?
CVE-2014-3954 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3954?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.