{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:45:02.930","vulnerabilities":[{"cve":{"id":"CVE-2018-17156","sourceIdentifier":"secteam@freebsd.org","published":"2018-11-28T16:29:00.483","lastModified":"2024-11-21T03:53:58.860","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In FreeBSD before 11.2-STABLE(r340268) and 11.2-RELEASE-p5, due to incorrectly accounting for padding on 64-bit platforms, a buffer underwrite could occur when constructing an ICMP reply packet when using a non-standard value for the net.inet.icmp.quotelen sysctl."},{"lang":"es","value":"En FreeBSD, en versiones anteriores a la 11.2-STABLE(r340268) y 11.2-RELEASE-p5, debido al recuento incorrecto de relleno en plataformas de 64 bits, podría ocurrir una subescritura de búfer al construir un paquete de respuesta ICMP al emplear un valor no estándar para la sysctl net.inet.icmp.quotelen."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndExcluding":"11.2","matchCriteriaId":"B7354D16-6431-43C2-97BA-EBBF482572C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*","matchCriteriaId":"E86CD544-86C4-4D9D-9CE5-087027509EDA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106052","source":"secteam@freebsd.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://security.freebsd.org/advisories/FreeBSD-EN-18:13.icmp.asc","source":"secteam@freebsd.org","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/106052","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://security.freebsd.org/advisories/FreeBSD-EN-18:13.icmp.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}