IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:42
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc - | |
References | () http://securitytracker.com/id?1005442 - Patch | |
References | () http://www.iss.net/security_center/static/10409.php - Patch | |
References | () http://www.kb.cert.org/vuls/id/328867 - US Government Resource | |
References | () http://www.securityfocus.com/bid/6010 - Patch |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:42
NVD link : CVE-2002-1978
Mitre link : CVE-2002-1978
CVE.ORG link : CVE-2002-1978
JSON object : View
Products Affected
darren_reed
- ipfilter
CWE
CWE-264
Permissions, Privileges, and Access Controls