CVE-1999-1018

IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:30

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=93312523904591&w=2 - () http://marc.info/?l=bugtraq&m=93312523904591&w=2 -
References () http://www.securityfocus.com/bid/543 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/543 - Patch, Vendor Advisory

Information

Published : 1999-07-27 04:00

Updated : 2024-11-20 23:30


NVD link : CVE-1999-1018

Mitre link : CVE-1999-1018

CVE.ORG link : CVE-1999-1018


JSON object : View

Products Affected

linux

  • linux_kernel