In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2025-02-13T17:26:26.737Z
Reserved: 2023-12-05T19:03:31.535Z
Link: CVE-2023-6534
No data.
Status : Modified
Published: 2023-12-13T09:15:34.680
Modified: 2024-11-21T08:44:02.973
Link: CVE-2023-6534
No data.
OpenCVE Enrichment
No data.
Weaknesses