IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
References
Configurations
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html - Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=98679734015538&w=2 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 - |
Information
Published : 2001-06-18 04:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0402
Mitre link : CVE-2001-0402
CVE.ORG link : CVE-2001-0402
JSON object : View
Products Affected
darren_reed
- ipfilter
openbsd
- openbsd
freebsd
- freebsd
CWE