First published: Fri Dec 31 2004(Updated: )
OpenBSD 3.3 and 3.4 does not properly parse Accept and Deny rules without netmasks on big-endian 64-bit platforms such as SPARC64, which may allow remote attackers to bypass access restrictions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =3.3 | |
OpenBSD | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2338 has a moderate severity rating as it allows remote attackers to bypass access restrictions.
To fix CVE-2004-2338, upgrade to OpenBSD versions 3.5 or later where the parsing of Accept and Deny rules is properly handled.
CVE-2004-2338 affects OpenBSD versions 3.3 and 3.4 on big-endian 64-bit platforms such as SPARC64.
The impact of CVE-2004-2338 is that it may allow unauthorized remote access by bypassing the intended access restrictions.
Yes, CVE-2004-2338 is specifically noted to affect big-endian 64-bit platforms, particularly SPARC64.