Description
In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
Problem types
CWE-476: NULL Pointer Dereference
Product status
14.3-RELEASE (release) before p7
13.5-RELEASE (release) before p8
References
security.freebsd.org/advisories/FreeBSD-SA-25:11.ipfw.asc