header-logo
Suggest Exploit
vendor:
OpenBSD PF
by:
SecurityFocus
2.6
CVSS
LOW
Information Leakage
200
CWE
Product Name: OpenBSD PF
Affected Version From: OpenBSD 2.6
Affected Version To: OpenBSD 2.6
Patch Exists: N/A
Related CWE: N/A
CPE: o:openbsd:openbsd
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2003

OpenBSD PF Information Leakage Vulnerability

OpenBSD PF is prone to an information leakage vulnerability when configured to redirect incoming traffic from standard ports to high ports. This occurs because PF responds differently to packets destined for active private addresses than to those destined for inactive ones. This could be exploited to enumerate network resources for other network segments in preparation for further attacks.

Mitigation:

Ensure that PF is configured to not redirect incoming traffic from standard ports to high ports.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8082/info

OpenBSD PF is prone to an information leakage vulnerability when configured to redirect incoming traffic from standard ports to high ports. This occurs because PF responds different to packets destined for active private addresses than to those destined for inactive ones. This could be exploited to enumerate network resources for other network segments in preparation for further attacks.

nmap -sS -P0 -n -T 4 -p 25 10.0.0.0/8

nmap -sS -P0 -n -T 4 -p 25,8025,1025,2500 10.0.0.0/8