First published: Mon Jun 18 2001(Updated: )
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Darren Reed IPFilter | <=3.4.16 | |
FreeBSD FreeBSD | <=4.1 | |
Openbsd Openbsd | =2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.