First published: Mon Mar 26 2001(Updated: )
ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =3.1 | |
FreeBSD FreeBSD | =3.5.1 | |
FreeBSD FreeBSD | =4.1 | |
FreeBSD FreeBSD | =3.0 | |
FreeBSD FreeBSD | =4.2 | |
FreeBSD FreeBSD | =3.3 | |
FreeBSD FreeBSD | =4.0 | |
FreeBSD FreeBSD | =4.1.1 | |
FreeBSD FreeBSD | =3.4 | |
FreeBSD FreeBSD | =3.5 | |
FreeBSD FreeBSD | =4.0-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0183 is considered a medium severity vulnerability as it allows remote attackers to bypass access restrictions.
To mitigate CVE-2001-0183, update your FreeBSD installation to a version later than 4.2 that includes the patch for this vulnerability.
CVE-2001-0183 affects FreeBSD versions 4.2 and earlier, including versions 3.0 to 4.1.1.
CVE-2001-0183 is associated with TCP packet manipulation where attackers can set the ECE flag to bypass firewall rules.
Yes, CVE-2001-0183 can be exploited remotely by attackers to gain unauthorized access.