First published: Mon Mar 26 2001(Updated: )
ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =3.1 | |
FreeBSD FreeBSD | =3.5.1 | |
FreeBSD FreeBSD | =4.1 | |
FreeBSD FreeBSD | =3.0 | |
FreeBSD FreeBSD | =4.2 | |
FreeBSD FreeBSD | =3.3 | |
FreeBSD FreeBSD | =4.0 | |
FreeBSD FreeBSD | =4.1.1 | |
FreeBSD FreeBSD | =3.4 | |
FreeBSD FreeBSD | =3.5 | |
FreeBSD FreeBSD | =4.0-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.