PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote malicious users to bypass intended packet filters via spoofed packets to other interfaces.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openbsd openbsd 3.2 |
||
openbsd openbsd 3.3 |
||
openbsd openbsd 3.4 |
||
openbsd openbsd 3.0 |
||
openbsd openbsd 3.1 |