CVE-2025-14769
EUVD-2025-20840509.03.2026, 12:16
In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| freebsd | freebsd | 13.5 |
| freebsd | freebsd | 13.5:p1 |
| freebsd | freebsd | 13.5:p2 |
| freebsd | freebsd | 13.5:p3 |
| freebsd | freebsd | 13.5:p4 |
| freebsd | freebsd | 13.5:p5 |
| freebsd | freebsd | 13.5:p6 |
| freebsd | freebsd | 13.5:p7 |
| freebsd | freebsd | 14.3 |
| freebsd | freebsd | 14.3:p1 |
| freebsd | freebsd | 14.3:p2 |
| freebsd | freebsd | 14.3:p3 |
| freebsd | freebsd | 14.3:p4 |
| freebsd | freebsd | 14.3:p5 |
| freebsd | freebsd | 14.3:p6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration