CVE-2025-14769
Plain English Summary
AI-powered analysis for quick understanding
An attacker can send specially crafted packets that may crash the system, causing a Denial of Service (DoS) by exploiting a flaw in how certain network rules handle packet data. This issue occurs when the system processes these packets without properly stopping the rules, allowing the traffic to go through even after the necessary data has been removed.
Technical Description
In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 9, 2026
30 days ago
Last Modified
Mar 9, 2026
30 days ago