First published: Fri Dec 31 2004(Updated: )
PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =3.1 | |
OpenBSD | =3.3 | |
OpenBSD | =3.2 | |
OpenBSD | =3.0 | |
OpenBSD | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1799 is considered a moderate to high severity vulnerability due to its potential for allowing unauthorized access through spoofed packets.
To mitigate CVE-2004-1799, you should upgrade to a non-vulnerable version of OpenBSD or configure packet filtering settings to restrict access solely to the intended interface.
CVE-2004-1799 affects OpenBSD versions 3.0 through 3.4.
CVE-2004-1799 can be exploited through packet spoofing, where an attacker sends packets from unauthorized interfaces to bypass firewall restrictions.
Yes, CVE-2004-1799 is directly related to stateful firewall settings in OpenBSD that do not enforce interface limitations for session packets.