Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-6534


In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers.  This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.


Published

2023-12-13T09:15:34.680

Last Modified

2024-11-21T08:44:02.973

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 12.4 Yes
Operating System freebsd freebsd 13.2 Yes
Operating System freebsd freebsd 13.2 Yes
Operating System freebsd freebsd 13.2 Yes
Operating System freebsd freebsd 13.2 Yes
Operating System freebsd freebsd 13.2 Yes
Operating System freebsd freebsd 13.2 Yes
Operating System freebsd freebsd 13.2 Yes
Operating System freebsd freebsd 14.0 Yes
Operating System freebsd freebsd 14.0 Yes
Operating System freebsd freebsd 14.0 Yes
Operating System freebsd freebsd 14.0 Yes
Operating System freebsd freebsd 14.0 Yes

References