CVE-2023-6534
13.12.2023, 09:15
In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.Enginsight
Vendor | Product | Version |
---|---|---|
freebsd | freebsd | 12.4 |
freebsd | freebsd | 12.4:p1 |
freebsd | freebsd | 12.4:p2 |
freebsd | freebsd | 12.4:p3 |
freebsd | freebsd | 12.4:p4 |
freebsd | freebsd | 12.4:p5 |
freebsd | freebsd | 12.4:p6 |
freebsd | freebsd | 12.4:p7 |
freebsd | freebsd | 12.4:p8 |
freebsd | freebsd | 12.4:rc2-p1 |
freebsd | freebsd | 12.4:rc2-p2 |
freebsd | freebsd | 13.2 |
freebsd | freebsd | 13.2:p1 |
freebsd | freebsd | 13.2:p2 |
freebsd | freebsd | 13.2:p3 |
freebsd | freebsd | 13.2:p4 |
freebsd | freebsd | 13.2:p5 |
freebsd | freebsd | 13.2:p6 |
freebsd | freebsd | 14.0 |
freebsd | freebsd | 14.0:beta5 |
freebsd | freebsd | 14.0:p1 |
freebsd | freebsd | 14.0:rc3 |
freebsd | freebsd | 14.0:rc4-p1 |
𝑥
= Vulnerable software versions