FreeBSD : FreeBSD -- Resource exhaustion in IP fragment reassembly (359e1548-a652-11e8-805b-a4badb2f4699)

High Nessus Plugin ID 112070


The remote FreeBSD host is missing one or more security-related updates.


A researcher has notified us of a DoS attack applicable to another operating system. While FreeBSD may not be vulnerable to that exact attack, we have identified several places where inadequate DoS protection could allow an attacker to consume system resources.

It is not necessary that the attacker be able to establish two-way communication to carry out these attacks. These attacks impact both IPv4 and IPv6 fragment reassembly. Impact : In the worst case, an attacker could send a stream of crafted fragments with a low packet rate which would consume a substantial amount of CPU.

Other attack vectors allow an attacker to send a stream of crafted fragments which could consume a large amount of CPU or all available mbuf clusters on the system.

These attacks could temporarily render a system unreachable through network interfaces or temporarily render a system unresponsive. The effects of the attack should clear within 60 seconds after the attack stops.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 112070

File Name: freebsd_pkg_359e1548a65211e8805ba4badb2f4699.nasl

Version: 1.4

Type: local

Published: 2018/08/23

Updated: 2018/12/07

Dependencies: 12634

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:FreeBSD, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info, Settings/ParanoidReport

Patch Publication Date: 2018/08/22

Vulnerability Publication Date: 2018/08/14

Reference Information

CVE: CVE-2018-6923

FreeBSD: SA-18:10.ip