{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T18:30:43.316","vulnerabilities":[{"cve":{"id":"CVE-2019-5598","sourceIdentifier":"secteam@freebsd.org","published":"2019-05-15T16:29:01.080","lastModified":"2025-04-03T06:15:40.680","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In FreeBSD 11.3-PRERELEASE before r345378, 12.0-STABLE before r345377, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in pf does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet allowing a maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable."},{"lang":"es","value":"n FreeBSD 11.3-PRERELEASE antes de r345378, 12.0-ESTABLE antes de r345377, 11.2-RELEASE antes de 11.2-RELEASE-p10, y 12.0-RELEASE antes de 12.0-RELEASE-p4, un error en pf no verifica si el paquete ICMP exterior o ICMP6 tiene la misma IP de destino que la IP de la fuente del paquete de protocolo interno permitiendo la creación maliciosa de un paquete ICMP / ICMP6   podría eludir las reglas de el  Packet Filter y pasar a un host que de lo contrario estará inhabilitado."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*","matchCriteriaId":"3ACD1D8D-B3BC-4E99-B846-90A4071DB87B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*","matchCriteriaId":"699FE432-8DF0-49F1-A98B-0E19CE01E5CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*","matchCriteriaId":"20B06752-39EE-4600-AC1F-69FB9C88E2A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*","matchCriteriaId":"22365F7C-2B00-4B61-84E8-EFBA3B8CFDC0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*","matchCriteriaId":"E86CD544-86C4-4D9D-9CE5-087027509EDA"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*","matchCriteriaId":"64E47AE7-BB45-428E-90E9-38BFDFF23650"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*","matchCriteriaId":"586B9FA3-65A2-41EB-A848-E4A75565F0CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*","matchCriteriaId":"F0B15B89-3AD2-4E03-9F47-DA934702187B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:rc3:*:*:*:*:*:*","matchCriteriaId":"878DF67E-420A-4229-BEA8-DB9F7161ED9A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*","matchCriteriaId":"826B53C2-517F-4FC6-92E8-E7FCB24F91B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*","matchCriteriaId":"93F10A46-AEF2-4FDD-92D6-0CF07B70F986"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*","matchCriteriaId":"C4029113-130F-4A33-A8A0-BC3E74000378"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html","source":"secteam@freebsd.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/108395","source":"secteam@freebsd.org"},{"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:06.pf.asc","source":"secteam@freebsd.org","tags":["Patch","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20190611-0001/","source":"secteam@freebsd.org"},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","source":"secteam@freebsd.org"},{"url":"https://www.synacktiv.com/posts/systems/icmp-reachable.html","source":"secteam@freebsd.org","tags":["Third Party Advisory"]},{"url":"http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://seclists.org/fulldisclosure/2025/Apr/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/108395","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-19:06.pf.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20190611-0001/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.synacktiv.com/posts/systems/icmp-reachable.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}