CVE-2019-5613
18.02.2020, 16:15
In FreeBSD 12.0-RELEASE before 12.0-RELEASE-p13, a missing check in the ipsec packet processor allows reinjection of an old packet to be accepted by the ipsec endpoint. Depending on the higher-level protocol in use over ipsec, this could allow an action to be repeated.Enginsight
| Vendor | Product | Version |
|---|---|---|
| freebsd | freebsd | 12.0 |
| freebsd | freebsd | 12.0:p1 |
| freebsd | freebsd | 12.0:p10 |
| freebsd | freebsd | 12.0:p11 |
| freebsd | freebsd | 12.0:p12 |
| freebsd | freebsd | 12.0:p2 |
| freebsd | freebsd | 12.0:p3 |
| freebsd | freebsd | 12.0:p4 |
| freebsd | freebsd | 12.0:p6 |
| freebsd | freebsd | 12.0:p7 |
| freebsd | freebsd | 12.0:p8 |
| freebsd | freebsd | 12.0:p9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration