ipfw in FreeBSD does not properly handle the use of "me" in its rules when point to point interfaces are used, which causes ipfw to allow connections from arbitrary remote hosts.
References
Link | Resource |
---|---|
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:53.ipfw.asc | Patch Vendor Advisory |
http://www.osvdb.org/1937 | |
http://www.securityfocus.com/bid/3206 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7002 | |
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:53.ipfw.asc | Patch Vendor Advisory |
http://www.osvdb.org/1937 | |
http://www.securityfocus.com/bid/3206 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7002 |
Configurations
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:53.ipfw.asc - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/1937 - | |
References | () http://www.securityfocus.com/bid/3206 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7002 - |
Information
Published : 2001-08-31 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-0969
Mitre link : CVE-2001-0969
CVE.ORG link : CVE-2001-0969
JSON object : View
Products Affected
freebsd
- freebsd
CWE