- Description
- In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
- Source
- secteam@freebsd.org
- NVD status
- Analyzed
- Products
- freebsd
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- secteam@freebsd.org
- CWE-476
- Hype score
- Not currently trending
CVE-2025-14769 In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the … https://t.co/wdlv7XrhSl
@CVEnew
9 Mar 2026
97 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-14769 NULL Pointer Dereference DoS Vulnerability in Netfilter TCP-SETMS... https://t.co/Wy9NIJf4a8 Vulnerability Alert Subscriptions: https://t.co/hrQhy5uz4x
@VulmonFeeds
9 Mar 2026
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:-:*:*:*:*:*:*",
"matchCriteriaId": "947F561E-AD65-43B9-94C1-3109A3D35248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p1:*:*:*:*:*:*",
"matchCriteriaId": "3D1987F1-1E08-4B28-8D16-D25A091D99ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "BEC1E8A0-0402-45F1-938D-FEFDCFC3E747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p3:*:*:*:*:*:*",
"matchCriteriaId": "D94457D6-738F-4ABB-BD46-F2B621531FE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p4:*:*:*:*:*:*",
"matchCriteriaId": "8C38CB56-B80C-4D1B-9267-16E8F985B170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p5:*:*:*:*:*:*",
"matchCriteriaId": "13DF1E38-5E8D-42FF-A4C5-092300864F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p6:*:*:*:*:*:*",
"matchCriteriaId": "83A86F81-0965-4600-835A-496756137998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:13.5:p7:*:*:*:*:*:*",
"matchCriteriaId": "987E31A4-7E21-471E-A3EA-4E53FFDB3DFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:*",
"matchCriteriaId": "9DC7C54E-58AF-4ADE-84AF-0EF0F325E20E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "D3D22B8C-36CF-4800-9673-0B0240558BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "242FA2A8-5D7D-4617-A411-2651FF3A3E4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:*",
"matchCriteriaId": "40573F60-F3B7-4AEC-846A-B08E5B7D9D00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:*",
"matchCriteriaId": "1FB832CE-0A98-44A2-8BAC-CD38A64279B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:*",
"matchCriteriaId": "9A785F8E-C218-41AE-8D57-BF06DDAEF7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:*",
"matchCriteriaId": "C3909FDD-B2A2-45B6-A40B-1D303A717F15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]