First published: Fri Dec 31 2004(Updated: )
PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =3.1 | |
OpenBSD | =3.3 | |
OpenBSD | =3.2 | |
OpenBSD | =3.0 | |
OpenBSD | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.