CVE-2023-4809
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/09/2023
Last modified:
13/02/2025
Description
In pf packet processing with a &#39;scrub fragment reassemble&#39; rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is.<br />
<br />
<br />
<br />
<br />
As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* | 12.4 (excluding) | |
| cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* | 13.0 (including) | 13.2 (excluding) |
| cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.4:p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.4:p2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.4:p3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.4:p4:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2023/09/08/5
- http://www.openwall.com/lists/oss-security/2023/09/08/6
- http://www.openwall.com/lists/oss-security/2023/09/08/7
- https://security.FreeBSD.org/advisories/FreeBSD-SA-23:10.pf.asc
- https://security.netapp.com/advisory/ntap-20231221-0009/
- http://www.openwall.com/lists/oss-security/2023/09/08/5
- http://www.openwall.com/lists/oss-security/2023/09/08/6
- http://www.openwall.com/lists/oss-security/2023/09/08/7
- https://security.FreeBSD.org/advisories/FreeBSD-SA-23:10.pf.asc
- https://security.netapp.com/advisory/ntap-20231221-0009/



