CVE-2007-4461

NuFW 2.2.3, and certain other versions after 2.0, allows remote attackers to bypass time-based packet filtering rules via certain "out of period" choices of packet transmission time.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nufw:nufw:2.2.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:35

Type Values Removed Values Added
References () http://osvdb.org/39725 - () http://osvdb.org/39725 -
References () http://secunia.com/advisories/26546 - Patch, Vendor Advisory () http://secunia.com/advisories/26546 - Patch, Vendor Advisory
References () http://www.nufw.org/+NuFW-2-2-4%2C201+.html - () http://www.nufw.org/+NuFW-2-2-4%2C201+.html -
References () http://www.securityfocus.com/bid/25379 - () http://www.securityfocus.com/bid/25379 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36134 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36134 -

07 Nov 2023, 02:01

Type Values Removed Values Added
References
  • {'url': 'http://www.nufw.org/+NuFW-2-2-4,201+.html', 'name': 'http://www.nufw.org/+NuFW-2-2-4,201+.html', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://www.nufw.org/+NuFW-2-2-4%2C201+.html -

Information

Published : 2007-08-21 21:17

Updated : 2024-11-21 00:35


NVD link : CVE-2007-4461

Mitre link : CVE-2007-4461

CVE.ORG link : CVE-2007-4461


JSON object : View

Products Affected

nufw

  • nufw