7.5

CVE-2023-4809

In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed.  That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is.




As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.

Data is provided by the National Vulnerability Database (NVD)
FreebsdFreebsd Version < 12.4
FreebsdFreebsd Version >= 13.0 < 13.2
FreebsdFreebsd Version12.4 Update-
FreebsdFreebsd Version12.4 Updatep1
FreebsdFreebsd Version12.4 Updatep2
FreebsdFreebsd Version12.4 Updatep3
FreebsdFreebsd Version12.4 Updatep4
FreebsdFreebsd Version12.4 Updaterc2-p1
FreebsdFreebsd Version12.4 Updaterc2-p2
FreebsdFreebsd Version13.2 Update-
FreebsdFreebsd Version13.2 Updatep1
FreebsdFreebsd Version13.2 Updatep2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.48% 0.64
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-167 Improper Handling of Additional Special Element

The product receives input from an upstream component, but it does not handle or incorrectly handles when an additional unexpected special element is provided.