Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:freebsd:freebsd:13.5:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.5:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.5:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.5:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.5:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.5:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.5:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.5:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:* |
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freebsd
Freebsd freebsd |
|
| Vendors & Products |
Freebsd
Freebsd freebsd |
Mon, 09 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 09 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass. | |
| Title | ipfw denial of service | |
| Weaknesses | CWE-476 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2026-03-09T13:30:18.204Z
Reserved: 2025-12-16T02:00:18.446Z
Link: CVE-2025-14769
Updated: 2026-03-09T13:29:47.428Z
Status : Analyzed
Published: 2026-03-09T12:16:11.280
Modified: 2026-03-17T15:55:19.447
Link: CVE-2025-14769
No data.
OpenCVE Enrichment
Updated: 2026-03-10T14:07:29Z