First published: Mon Jun 18 2001(Updated: )
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phildev IPFilter | <=3.4.16 | |
OpenBSD | =2.8 | |
FreeBSD Kernel | <=4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0402 has a medium severity level due to its potential to allow unauthorized access through fragmented packets.
To fix CVE-2001-0402, you should upgrade IPFilter to version 3.4.17 or later, as this version addresses the vulnerability.
CVE-2001-0402 affects IPFilter versions up to and including 3.4.16, as well as specific OpenBSD and FreeBSD versions.
CVE-2001-0402 is a security vulnerability that allows remote attackers to bypass access restrictions.
Yes, CVE-2001-0402 can be exploited remotely by attackers who send specially crafted fragmented packets.