CVE-2019-5598
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
15/05/2019
Last modified:
03/04/2025
Description
In FreeBSD 11.3-PRERELEASE before r345378, 12.0-STABLE before r345377, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in pf does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet allowing a maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.2:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html
- http://www.securityfocus.com/bid/108395
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:06.pf.asc
- https://security.netapp.com/advisory/ntap-20190611-0001/
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.synacktiv.com/posts/systems/icmp-reachable.html
- http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html
- http://seclists.org/fulldisclosure/2025/Apr/1
- http://www.securityfocus.com/bid/108395
- https://security.FreeBSD.org/advisories/FreeBSD-SA-19:06.pf.asc
- https://security.netapp.com/advisory/ntap-20190611-0001/
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.synacktiv.com/posts/systems/icmp-reachable.html



