IRC DCC helper in the ip_masq_irc IP masquerading module 2.2 allows remote attackers to bypass intended firewall restrictions by causing the target system to send a "DCC SEND" request to a malicious server which listens on port 6667, which may cause the module to believe that the traffic is a valid request and allow the connection to the port specified in the DCC SEND request.
References
| Link | Resource |
|---|---|
| http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html | Broken Link |
| http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html | Broken Link |
| http://www.iss.net/security_center/static/6923.php | Broken Link |
| http://www.osvdb.org/1916 | Broken Link |
| http://www.securityfocus.com/bid/3117 | Third Party Advisory Vendor Advisory |
| http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html | Broken Link |
| http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html | Broken Link |
| http://www.iss.net/security_center/static/6923.php | Broken Link |
| http://www.osvdb.org/1916 | Broken Link |
| http://www.securityfocus.com/bid/3117 | Third Party Advisory Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html - Broken Link | |
| References | () http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html - Broken Link | |
| References | () http://www.iss.net/security_center/static/6923.php - Broken Link | |
| References | () http://www.osvdb.org/1916 - Broken Link | |
| References | () http://www.securityfocus.com/bid/3117 - Third Party Advisory, Vendor Advisory |
Information
Published : 2001-07-30 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-1056
Mitre link : CVE-2001-1056
CVE.ORG link : CVE-2001-1056
JSON object : View
Products Affected
linux
- linux_kernel
CWE
