pf incorrectly handles multiple IPv6 fragment headers
CVE-2023-4809
7.5HIGH
What is CVE-2023-4809?
A vulnerability exists in pf's packet processing that could allow IPv6 fragments to evade firewall rules. When handling packets with multiple IPv6 fragment headers under a 'scrub fragment reassemble' rule, pf fails to recognize the correct ultimate payload. Instead, these packets are mistakenly interpreted as fragmented, thus bypassing established firewall controls. This could lead to unauthorized packet forwarding or processing at the host, compromising network security and integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
FreeBSD 13.2-RELEASE
FreeBSD 12.4-RELEASE
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Enrico Bassetti bassetti@di.uniroma1.it (NetSecurityLab @ Sapienza University of Rome)
