IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
References
Configurations
History
No history.
Information
Published : 2001-06-18 04:00
Updated : 2024-02-04 16:31
NVD link : CVE-2001-0402
Mitre link : CVE-2001-0402
CVE.ORG link : CVE-2001-0402
JSON object : View
Products Affected
openbsd
- openbsd
darren_reed
- ipfilter
freebsd
- freebsd
CWE