ID

VAR-201507-0041


CVE

CVE-2015-5358


TITLE

Juniper Junos OS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-003849

DESCRIPTION

Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.2X52 before 13.2X52-D25, 13.3 before 13.3R6, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D16, 14.1X55 before 14.1X55-D25, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (mbuf and connection consumption and restart) via a large number of requests that trigger a TCP connection to move to the LAST_ACK state when there is more data to send. Juniper Junos is prone to a remote denial-of-service vulnerability. A remote attacker may exploit this issue to reboot the device, denying service to legitimate users. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Networks Junos OS. The following versions are affected; Juniper Networks Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15 , 13.2 version before 13.2R7, 13.2X51 version before 13.2X51-D35, 13.2X52 version before 13.2X52-D25, 13.3 version before 13.3R6, 14.1R3 version before 14.1R3-S2, 14.1 version before 14.1R4, 14.1X53-D12 Version 14.1X53 before, Version 14.1X53 before 14.1X53-D16, Version 14.1X55 before 14.1X55-D25, Version 14.2 before 14.2R2, Version 15.1 before 15.1R1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-15:13.tcp Security Advisory The FreeBSD Project Topic: Resource exhaustion due to sessions stuck in LAST_ACK state Category: core Module: inet Announced: 2015-07-21 Credits: Lawrence Stewart (Netflix, Inc.), Jonathan Looney (Juniper SIRT) Affects: All supported versions of FreeBSD. Corrected: 2015-07-21 23:42:17 UTC (stable/10, 10.2-PRERELEASE) 2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA1-p1) 2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA2-p1) 2015-07-21 23:42:56 UTC (releng/10.1, 10.1-RELEASE-p15) 2015-07-21 23:42:20 UTC (stable/9, 9.3-STABLE) 2015-07-21 23:42:56 UTC (releng/9.3, 9.3-RELEASE-p20) 2015-07-21 23:42:20 UTC (stable/8, 8.4-STABLE) 2015-07-21 23:42:56 UTC (releng/8.4, 8.4-RELEASE-p34) CVE Name: CVE-2015-5358 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:https://security.FreeBSD.org/>. I. Background The Transmission Control Protocol (TCP) of the TCP/IP protocol suite provides a connection-oriented, reliable, sequence-preserving data stream service. A socket enters the LAST_ACK state when the local process closes its socket after a FIN has already been received from the remote peer. The socket will remain in the LAST_ACK state until the kernel has transmitted a FIN to the remote peer and the kernel has received an acknowledgement of that FIN from the remote peer, or all retransmits of the FIN have failed and the connection times out. II. III. This may also happen in normal operation where no intentional attack is conducted, but an attacker who can send specifically crafted packets can trigger this more reliably. IV. Workaround No workaround is available, but systems that do not provide TCP based service to untrusted networks are not vulnerable. Note that the tcpdrop(8) utility can be used to purge connections which have become wedged. For example, the following command can be used to generate commands that would drop all connections whose last rcvtime is more than 100s: netstat -nxp tcp | \ awk '{ if (int($NF) > 100) print "tcpdrop " $4 " " $5 }' The system administrator can then run the generated script as a temporary measure. Please refer to the tcpdump(8) manual page for additional information. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 10.1] # fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch # fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch.asc # gpg --verify tcp.patch.asc [FreeBSD 9.x and 8.x] # fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch # fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch.asc # gpg --verify tcp-9.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in <URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/8/ r285779 releng/8.4/ r285780 stable/9/ r285779 releng/9.3/ r285780 stable/10/ r285778 releng/10.1/ r285780 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. References <URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5358> The latest revision of this advisory is available at <URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:13.tcp.asc> -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.6 (FreeBSD) iQIcBAEBCgAGBQJVrtnrAAoJEO1n7NZdz2rnchoQAMUV9fuXsBvQgvugFVpoe4HP t7tTIzKKmvC3SVOQfPF6jQllVL9qbRJK9zVdFcGX0Iy07/QPKMIRIFXqiYmRwyXt YEuZtZMHEo6w5YS/gEwSndGRFduFAfhaNZndycjA3O5nxR16cvqScDUAv0nErQGD jJzhjbwdrT4fLg06PgLOdNwQKOPhdM1k4ZOdg7WUYDi2iQUmYpD2SOzRAx/SoDK7 N0qd7Cy7mZBLbmm1zbCGDPhvNVYCKQjPjhiZ1GhfzUQ2n9bBOGLf2K1d/N0cttFH /MfJoi2yRlU3iJE2DOJeD0/m4sJLmTL/7sqYEP9W2939oVH0Bku/KoJG4I4rZLDl 6yoKTxtyJGxbw8N2M/ObFpCQwn56Vjf2oo1LhIdBb+T48OwSwxuwrtw4VnlUnVLo oJ5UA1VnazoyU6AwADpHkGPEPvRF1SUXfOuIOoHiZZ6O3eHdoeD3e2HqLQhoYVCj PMEi/k45jPnWWhwV76I65Ig02YRgzhMTSunjXLQhi44Eeavf1SxHTJpSHuVjg3zu MDDW55yB+wJvoetwCg3IkFPfmFBmto679xywDCKVd9VYeKoFsiVE4F/APqf6hN7o qO8etL5oXnwjNsm9Tf8vImoWrBw2gRYkSieG+Vsx4r2r5JNHKRg1AVmRdihI1ATb canMZYhLMD6A1x5T54Ya =UPeI -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2015-5358 // JVNDB: JVNDB-2015-003849 // BID: 75731 // VULHUB: VHN-83319 // PACKETSTORM: 132801

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:13.2x52

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:13.3

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.1x46

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.1x47

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x55

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.1x44

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:13.2x51

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:12.3x48

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:14.1x53

Trust: 1.0

vendor:junipermodel:junos osscope:eqversion:12.1x47-d25

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:14.1r3

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.2x51-d35

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x44

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.2r7

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.3x48

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.3r6

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:14.1x55

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:14.1x53-d12

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x44-d50

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.3

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:14.2

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:14.1x55-d25

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.3

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:14.2r2

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.3r9

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.3x48-d15

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.2

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:14.1x53

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:14.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:13.2x52-d25

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:14.1x53-d16

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:14.1r3-s2

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x46

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.2x52

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:12.1x47

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:12.1x46-d35

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1r1

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:13.2x51

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:15.1

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:14.1r4

Trust: 0.8

vendor:junipermodel:junos 15.1x49-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.2r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 14.1r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r3-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r1.7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.3r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r2-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 13.2r1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r8.7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r8scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r7-s1scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r7scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r6.6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r4.6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r4-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r4-s2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r3.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2-s3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.3r2scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d11scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d10scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d45scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d40scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35.5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d35scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d34scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d32scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30.4scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d30scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d26scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d25scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20.3scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d20scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d15scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r1scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.2r2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x55-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d16scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1x53-d12scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r4scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 14.1r3-s2scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.3r6scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2x52-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 13.2r7scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d20scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3x48-d15scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.3r9scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x47-d25scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x46-d35scope:neversion: -

Trust: 0.3

vendor:junipermodel:junos 12.1x44-d50scope:neversion: -

Trust: 0.3

sources: BID: 75731 // JVNDB: JVNDB-2015-003849 // CNNVD: CNNVD-201507-366 // NVD: CVE-2015-5358

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5358
value: HIGH

Trust: 1.0

NVD: CVE-2015-5358
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201507-366
value: HIGH

Trust: 0.6

VULHUB: VHN-83319
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5358
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-83319
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-83319 // JVNDB: JVNDB-2015-003849 // CNNVD: CNNVD-201507-366 // NVD: CVE-2015-5358

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-83319 // JVNDB: JVNDB-2015-003849 // NVD: CVE-2015-5358

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201507-366

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201507-366

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003849

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-83319

PATCH

title:JSA10686url:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686

Trust: 0.8

sources: JVNDB: JVNDB-2015-003849

EXTERNAL IDS

db:NVDid:CVE-2015-5358

Trust: 2.9

db:JUNIPERid:JSA10686

Trust: 2.0

db:SECTRACKid:1032842

Trust: 1.7

db:SECTRACKid:1033915

Trust: 1.1

db:SECTRACKid:1033007

Trust: 1.1

db:MCAFEEid:SB10128

Trust: 1.1

db:JVNDBid:JVNDB-2015-003849

Trust: 0.8

db:CNNVDid:CNNVD-201507-366

Trust: 0.7

db:BIDid:75731

Trust: 0.4

db:PACKETSTORMid:132801

Trust: 0.2

db:VULHUBid:VHN-83319

Trust: 0.1

sources: VULHUB: VHN-83319 // BID: 75731 // JVNDB: JVNDB-2015-003849 // PACKETSTORM: 132801 // CNNVD: CNNVD-201507-366 // NVD: CVE-2015-5358

REFERENCES

url:http://www.securitytracker.com/id/1032842

Trust: 1.7

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10686

Trust: 1.6

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-009.txt.asc

Trust: 1.1

url:http://www.securitytracker.com/id/1033007

Trust: 1.1

url:http://www.securitytracker.com/id/1033915

Trust: 1.1

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10128

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5358

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5358

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10686&cat=sirt_1&actp=list

Trust: 0.3

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10686

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10128

Trust: 0.1

url:https://security.freebsd.org/advisories/freebsd-sa-15:13.tcp.asc>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5358

Trust: 0.1

url:https://security.freebsd.org/>.

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:13/tcp.patch.asc

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:13/tcp.patch

Trust: 0.1

url:https://www.freebsd.org/handbook/kernelconfig.html>

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5358>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:13/tcp-9.patch

Trust: 0.1

url:https://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

url:https://security.freebsd.org/patches/sa-15:13/tcp-9.patch.asc

Trust: 0.1

sources: VULHUB: VHN-83319 // BID: 75731 // JVNDB: JVNDB-2015-003849 // PACKETSTORM: 132801 // CNNVD: CNNVD-201507-366 // NVD: CVE-2015-5358

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 75731

SOURCES

db:VULHUBid:VHN-83319
db:BIDid:75731
db:JVNDBid:JVNDB-2015-003849
db:PACKETSTORMid:132801
db:CNNVDid:CNNVD-201507-366
db:NVDid:CVE-2015-5358

LAST UPDATE DATE

2025-04-13T23:27:32.509000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-83319date:2017-09-21T00:00:00
db:BIDid:75731date:2015-07-13T00:00:00
db:JVNDBid:JVNDB-2015-003849date:2015-07-22T00:00:00
db:CNNVDid:CNNVD-201507-366date:2015-07-15T00:00:00
db:NVDid:CVE-2015-5358date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-83319date:2015-07-14T00:00:00
db:BIDid:75731date:2015-07-13T00:00:00
db:JVNDBid:JVNDB-2015-003849date:2015-07-22T00:00:00
db:PACKETSTORMid:132801date:2015-07-22T18:04:19
db:CNNVDid:CNNVD-201507-366date:2015-07-15T00:00:00
db:NVDid:CVE-2015-5358date:2015-07-14T17:59:09.213