CVE-2001-0402

IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Configurations

Configuration 1 (hide)

cpe:2.3:a:darren_reed:ipfilter:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*

History

20 Nov 2024, 23:35

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html - Patch, Vendor Advisory () http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=98679734015538&w=2 - () http://marc.info/?l=bugtraq&m=98679734015538&w=2 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 -

Information

Published : 2001-06-18 04:00

Updated : 2024-11-20 23:35


NVD link : CVE-2001-0402

Mitre link : CVE-2001-0402

CVE.ORG link : CVE-2001-0402


JSON object : View

Products Affected

darren_reed

  • ipfilter

openbsd

  • openbsd

freebsd

  • freebsd