First published: Fri Mar 03 2023(Updated: )
In OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the kernel.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openbsd | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-27567.
The affected software is OpenBSD 7.2.
The severity of CVE-2023-27567 is high with a CVSS score of 7.5.
The vulnerability can be exploited by sending a TCP packet with destination port 0 that matches a pf divert-to rule in OpenBSD 7.2.
Yes, a patch is available for CVE-2023-27567. You can find the patch at the following links: [Link 1](https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/013_tcp.patch.sig), [Link 2](https://github.com/openbsd/src/commit/0a543725ccdd2a01669122ce79bb67e66ede77f2).