In pf packet processing with a 'scrub fragment reassemble' rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is. As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published: 2023-09-06T19:26:45.833Z

Updated: 2024-08-02T07:38:00.699Z

Reserved: 2023-09-06T17:11:30.349Z

Link: CVE-2023-4809

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-06T20:15:08.080

Modified: 2024-11-21T08:36:00.910

Link: CVE-2023-4809

cve-icon Redhat

No data.