NetBSD contains a flaw that may allow a malicious user to hijack a connection. The issue is triggered when the address information of incoming ARP packets is not checked to ensure that it corresponds to one of the addresses of the interface on which the packet arrived. It is possible that the flaw may allow suppression or redirection of traffic from the attacked host to a different destination, resulting in a loss of integrity.
Currently, there are no known workarounds or upgrades to correct this issue. However, NetBSD has released a patch to address this vulnerability.