vulnerability

FreeBSD: VID-D35373AE-4D34-11EE-8E38-002590C1F29C (CVE-2023-4809): FreeBSD -- pf incorrectly handles multiple IPv6 fragment headers

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
Sep 6, 2023
Added
Sep 7, 2023
Modified
Jan 28, 2025

Description

In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is.






As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.

Solution(s)

freebsd-upgrade-base-12_4-release-p5freebsd-upgrade-base-13_2-release-p3
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.