PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces.
Link | Tags |
---|---|
http://www.osvdb.org/19105 | vdb entry |
http://marc.info/?l=full-disclosure&m=107331321302113&w=2 | mailing list |
http://www.securityfocus.com/bid/9362 | vdb entry |