pf incorrectly handles multiple IPv6 fragment headers
CVE-2023-4809
7.5HIGH
What is CVE-2023-4809?
A vulnerability exists in pf's packet processing that could allow IPv6 fragments to evade firewall rules. When handling packets with multiple IPv6 fragment headers under a 'scrub fragment reassemble' rule, pf fails to recognize the correct ultimate payload. Instead, these packets are mistakenly interpreted as fragmented, thus bypassing established firewall controls. This could lead to unauthorized packet forwarding or processing at the host, compromising network security and integrity.
Affected Version(s)
FreeBSD 13.2-RELEASE
FreeBSD 12.4-RELEASE
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Enrico Bassetti [email protected] (NetSecurityLab @ Sapienza University of Rome)