In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.
2023-12-13T09:15:34.680
2024-11-21T08:44:02.973
Modified
CVSSv3.1: 7.5 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 12.4 | Yes |
Operating System | freebsd | freebsd | 13.2 | Yes |
Operating System | freebsd | freebsd | 13.2 | Yes |
Operating System | freebsd | freebsd | 13.2 | Yes |
Operating System | freebsd | freebsd | 13.2 | Yes |
Operating System | freebsd | freebsd | 13.2 | Yes |
Operating System | freebsd | freebsd | 13.2 | Yes |
Operating System | freebsd | freebsd | 13.2 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |