FreeBSD-SA-23:17.pf

  • Thread starter FreeBSD Security
  • Start date
Status
Not open for further replies.
F

FreeBSD Security

Guest
As part of its stateful TCP connection tracking implementation, pf performs sequence number validation on inbound packets. This makes it difficult for a would-be attacker to spoof the sender and inject packets into a TCP stream, since crafted packets must contain sequence numbers which match the current connection state to avoid being rejected by the firewall.

A bug in the implementation of sequence number validation means that the sequence number is not in fact validated, allowing an attacker who is able to impersonate the remote host and guess the connection's port numbers to inject packets into the TCP stream.
Continue reading...
 
Status
Not open for further replies.
Back
Top