CVE-2014-7250

NameCVE-2014-7250
DescriptionThe TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs778367

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kfreebsd-10 (PTS)jessie10.1~svn274115-4vulnerable
sid, stretch10.3~svn300087-3undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-10source(unstable)undeterminedmedium778367
kfreebsd-10sourcejessie(unfixed)end-of-life
kfreebsd-8source(unstable)undeterminedmedium
kfreebsd-8sourcewheezy(unfixed)end-of-life
kfreebsd-9source(unstable)undeterminedmedium
kfreebsd-9sourcewheezy(unfixed)end-of-life

Notes

[wheezy] - kfreebsd-8 <end-of-life> (Not supported in wheezy LTS)
[wheezy] - kfreebsd-9 <end-of-life> (Not supported in wheezy LTS)
[jessie] - kfreebsd-10 <end-of-life> (Not supported in Jessie LTS)

Search for package or bug name: Reporting problems