Bypassing Packet Filters in OpenBSD with Stateful Filtering Enabled
CVE-2004-1799 · HIGH Severity
AV:N/AC:L/AU:N/C:P/I:P/A:P
PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.
Learn more about our Web Application Penetration Testing UK.