First published: Thu Aug 23 2001(Updated: )
TCP Wrappers (tcp_wrappers) in FreeBSD 4.1.1 through 4.3 with the PARANOID ACL option enabled does not properly check the result of a reverse DNS lookup, which could allow remote attackers to bypass intended access restrictions via DNS spoofing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | >=4.1.1<=4.3 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1155 has a medium severity rating due to the potential for unauthorized access caused by DNS spoofing.
To fix CVE-2001-1155, consider disabling the PARANOID ACL option or upgrading to a non-vulnerable version of FreeBSD.
FreeBSD versions 4.1.1 through 4.3 are affected by CVE-2001-1155.
Exploiting CVE-2001-1155 allows remote attackers to bypass access restrictions, potentially leading to unauthorized actions on the system.
No, CVE-2001-1155 is not a denial-of-service vulnerability; it primarily involves unauthorized access via DNS spoofing.