Vulnerability Details : CVE-2014-3955
routed in FreeBSD 8.4 through 10.1-RC2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RIP request from a source not on a directly connected network.
Vulnerability category: Input validationDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-3955
Probability of exploitation activity in the next 30 days: 0.94%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 81 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3955
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-3955
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3955
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc
Patch
-
http://www.securitytracker.com/id/1031099
FreeBSD routed(8) Processing Flaw Lets Remote Users Deny Service - SecurityTracker
Products affected by CVE-2014-3955
- cpe:2.3:o:freebsd:freebsd:9.0:beta1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.0:beta2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.0:beta3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:prerelease:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:rc2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.1:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.1:rc2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.3:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.3:rc2:*:*:*:*:*:*