Lucene search

K
nvd[email protected]NVD:CVE-2023-4809
HistorySep 06, 2023 - 8:15 p.m.

CVE-2023-4809

2023-09-0620:15:08
CWE-167
web.nvd.nist.gov
1
cve-2023-4809
pf firewall
packet processing
ipv6 fragments
security vulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

21.4%

In pf packet processing with a ‘scrub fragment reassemble’ rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is.

As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.

Affected configurations

NVD
Node
freebsdfreebsdRange<12.4
OR
freebsdfreebsdRange13.013.2
OR
freebsdfreebsdMatch12.4-
OR
freebsdfreebsdMatch12.4p1
OR
freebsdfreebsdMatch12.4p2
OR
freebsdfreebsdMatch12.4p3
OR
freebsdfreebsdMatch12.4p4
OR
freebsdfreebsdMatch12.4rc2-p1
OR
freebsdfreebsdMatch12.4rc2-p2
OR
freebsdfreebsdMatch13.2-
OR
freebsdfreebsdMatch13.2p1
OR
freebsdfreebsdMatch13.2p2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

21.4%