Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:05.ipsec.asc", "name": "FreeBSD-SA-18:05", "tags": ["Vendor Advisory"], "refsource": "FREEBSD"}, {"url": "http://www.securitytracker.com/id/1040628", "name": "1040628", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "SECTRACK"}, {"url": "http://www.securityfocus.com/bid/103666", "name": "103666", "tags": ["Third Party Advisory", "VDB Entry"], "refsource": "BID"}, {"url": "https://support.apple.com/kb/HT210090", "name": "https://support.apple.com/kb/HT210090", "tags": [], "refsource": "CONFIRM"}, {"url": "https://seclists.org/bugtraq/2019/May/77", "name": "20190531 APPLE-SA-2019-5-30-1 AirPort Base Station Firmware Update 7.9.1", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://seclists.org/fulldisclosure/2019/Jun/6", "name": "20190611 APPLE-SA-2019-5-30-1 AirPort Base Station Firmware Update 7.9.1", "tags": [], "refsource": "FULLDISC"}, {"url": "https://support.apple.com/kb/HT210091", "name": "https://support.apple.com/kb/HT210091", "tags": [], "refsource": "CONFIRM"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "In FreeBSD before 11.1-STABLE, 11.1-RELEASE-p9, 10.4-STABLE, 10.4-RELEASE-p8 and 10.3-RELEASE-p28, the length field of the ipsec option header does not count the size of the option header itself, causing an infinite loop when the length is zero. This issue can allow a remote attacker who is able to send an arbitrary packet to cause the machine to crash."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-835"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2018-6918", "ASSIGNER": "secteam@freebsd.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "severity": "HIGH", "impactScore": 6.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}}, "publishedDate": "2018-04-04T14:29Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "10.4", "versionStartIncluding": "10.0"}, {"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndExcluding": "11.1", "versionStartIncluding": "11.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-10-03T00:03Z"}