In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
History

Mon, 09 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule would allow the traffic to pass.
Title ipfw denial of service
Weaknesses CWE-476
References

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published: 2026-03-09T11:34:52.386Z

Updated: 2026-03-09T13:30:18.204Z

Reserved: 2025-12-16T02:00:18.446Z

Link: CVE-2025-14769

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-09T12:16:11.280

Modified: 2026-03-09T13:35:07.393

Link: CVE-2025-14769

cve-icon Redhat

No data.