pf incorrectly handles multiple IPv6 fragment headers
CVE-2023-4809

7.5HIGH

Key Information:

Vendor

FreeBSD

Status
Vendor
CVE Published:
6 September 2023

What is CVE-2023-4809?

A vulnerability exists in pf's packet processing that could allow IPv6 fragments to evade firewall rules. When handling packets with multiple IPv6 fragment headers under a 'scrub fragment reassemble' rule, pf fails to recognize the correct ultimate payload. Instead, these packets are mistakenly interpreted as fragmented, thus bypassing established firewall controls. This could lead to unauthorized packet forwarding or processing at the host, compromising network security and integrity.

Affected Version(s)

FreeBSD 13.2-RELEASE

FreeBSD 12.4-RELEASE

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Enrico Bassetti [email protected] (NetSecurityLab @ Sapienza University of Rome)
.