CVE Vulnerabilities

CVE-2023-6534

Published: Dec 13, 2023 | Modified: Jan 12, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers.  This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.

Affected Software

Name Vendor Start Version End Version
Freebsd Freebsd 12.4 (including) 12.4 (including)
Freebsd Freebsd 12.4-p1 (including) 12.4-p1 (including)
Freebsd Freebsd 12.4-p2 (including) 12.4-p2 (including)
Freebsd Freebsd 12.4-p3 (including) 12.4-p3 (including)
Freebsd Freebsd 12.4-p4 (including) 12.4-p4 (including)
Freebsd Freebsd 12.4-p5 (including) 12.4-p5 (including)
Freebsd Freebsd 12.4-p6 (including) 12.4-p6 (including)
Freebsd Freebsd 12.4-p7 (including) 12.4-p7 (including)
Freebsd Freebsd 12.4-p8 (including) 12.4-p8 (including)
Freebsd Freebsd 12.4-rc2-p1 (including) 12.4-rc2-p1 (including)
Freebsd Freebsd 12.4-rc2-p2 (including) 12.4-rc2-p2 (including)
Freebsd Freebsd 13.2 (including) 13.2 (including)
Freebsd Freebsd 13.2-p1 (including) 13.2-p1 (including)
Freebsd Freebsd 13.2-p2 (including) 13.2-p2 (including)
Freebsd Freebsd 13.2-p3 (including) 13.2-p3 (including)
Freebsd Freebsd 13.2-p4 (including) 13.2-p4 (including)
Freebsd Freebsd 13.2-p5 (including) 13.2-p5 (including)
Freebsd Freebsd 13.2-p6 (including) 13.2-p6 (including)
Freebsd Freebsd 14.0 (including) 14.0 (including)
Freebsd Freebsd 14.0-beta5 (including) 14.0-beta5 (including)
Freebsd Freebsd 14.0-p1 (including) 14.0-p1 (including)
Freebsd Freebsd 14.0-rc3 (including) 14.0-rc3 (including)
Freebsd Freebsd 14.0-rc4-p1 (including) 14.0-rc4-p1 (including)

References