In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference.

Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 09 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
Title ipfw denial of service
Weaknesses CWE-476
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2026-03-09T11:34:52.386Z

Reserved: 2025-12-16T02:00:18.446Z

Link: CVE-2025-14769

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-09T12:16:11.280

Modified: 2026-03-09T12:16:11.280

Link: CVE-2025-14769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses