IRC DCC helper in the ip_masq_irc IP masquerading module 2.2 allows remote attackers to bypass intended firewall restrictions by causing the target system to send a "DCC SEND" request to a malicious server which listens on port 6667, which may cause the module to believe that the traffic is a valid request and allow the connection to the port specified in the DCC SEND request.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html | Broken Link |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html | Broken Link |
http://www.iss.net/security_center/static/6923.php | Broken Link |
http://www.osvdb.org/1916 | Broken Link |
http://www.securityfocus.com/bid/3117 | Third Party Advisory Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html | Broken Link |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html | Broken Link |
http://www.iss.net/security_center/static/6923.php | Broken Link |
http://www.osvdb.org/1916 | Broken Link |
http://www.securityfocus.com/bid/3117 | Third Party Advisory Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html - Broken Link | |
References | () http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html - Broken Link | |
References | () http://www.iss.net/security_center/static/6923.php - Broken Link | |
References | () http://www.osvdb.org/1916 - Broken Link | |
References | () http://www.securityfocus.com/bid/3117 - Third Party Advisory, Vendor Advisory |
Information
Published : 2001-07-30 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-1056
Mitre link : CVE-2001-1056
CVE.ORG link : CVE-2001-1056
JSON object : View
Products Affected
linux
- linux_kernel
CWE