ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:34
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc - Patch, Vendor Advisory | |
References | () http://www.ciac.org/ciac/bulletins/l-029.shtml - | |
References | () http://www.osvdb.org/1743 - | |
References | () http://www.security-express.com/archives/bugtraq/2001-01/0424.html - | |
References | () http://www.securityfocus.com/bid/2293 - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/5998 - |
Information
Published : 2001-03-26 05:00
Updated : 2024-11-20 23:34
NVD link : CVE-2001-0183
Mitre link : CVE-2001-0183
CVE.ORG link : CVE-2001-0183
JSON object : View
Products Affected
freebsd
- freebsd
CWE