Continue reading...Due to a lack of strict checking, an attacker from a trusted host can send a specially constructed IP packet that may lead to a system crash.
Additionally, a use-after-free vulnerability in the AH handling code could cause unpredictable results.