7.5
CWE
NVD-CWE-Other
Advisory Published
CVE Published
Updated

CVE-2004-1799

First published: Fri Dec 31 2004(Updated: )

PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
OpenBSD=3.1
OpenBSD=3.3
OpenBSD=3.2
OpenBSD=3.0
OpenBSD=3.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2004-1799?

    CVE-2004-1799 is considered a moderate to high severity vulnerability due to its potential for allowing unauthorized access through spoofed packets.

  • How do I fix CVE-2004-1799?

    To mitigate CVE-2004-1799, you should upgrade to a non-vulnerable version of OpenBSD or configure packet filtering settings to restrict access solely to the intended interface.

  • What versions of OpenBSD are affected by CVE-2004-1799?

    CVE-2004-1799 affects OpenBSD versions 3.0 through 3.4.

  • What type of attack can exploit CVE-2004-1799?

    CVE-2004-1799 can be exploited through packet spoofing, where an attacker sends packets from unauthorized interfaces to bypass firewall restrictions.

  • Is CVE-2004-1799 related to firewall settings?

    Yes, CVE-2004-1799 is directly related to stateful firewall settings in OpenBSD that do not enforce interface limitations for session packets.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203