First published: Tue Jun 25 2002(Updated: )
The TCP implementation in various BSD operating systems (tcp_input.c) does not properly block connections to broadcast addresses, which could allow remote attackers to bypass intended filters via packets with a unicast link layer address and an IP broadcast address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD current | =2.0.4 | |
FreeBSD Kernel | <=4.5 | |
OpenBSD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0381 has a moderate severity rating due to its potential for exploitation through network traffic.
To fix CVE-2002-0381, ensure that your BSD operating system is updated to a version that addresses this vulnerability.
CVE-2002-0381 affects various BSD operating systems, including specific versions of NetBSD, FreeBSD, and OpenBSD.
CVE-2002-0381 can facilitate network attacks that bypass intended packet filters by using broadcast addresses.
If exploited, CVE-2002-0381 allows remote attackers to send packets that could bypass security protocols designed to block broadcast connections.