Bypassing Packet Filters in OpenBSD with Stateful Filtering Enabled

Bypassing Packet Filters in OpenBSD with Stateful Filtering Enabled

CVE-2004-1799 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.

Learn more about our Web Application Penetration Testing UK.