Shorewall 2.4.x before 2.4.1, 2.2.x before 2.2.5, and 2.0.x before 2.0.17, when MACLIST_TTL is greater than 0 or MACLIST_DISPOSITION is set to ACCEPT, allows remote attackers with an accepted MAC address to bypass other firewall rules or policies.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/16087 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/17110 - | |
References | () http://secunia.com/advisories/17113 - | |
References | () http://shorewall.net/News.htm#20050717 - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2005/dsa-849 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200507-20.xml - | |
References | () http://www.securityfocus.com/bid/14292 - | |
References | () http://www.ubuntu.com/usn/usn-197-1 - |
Information
Published : 2005-07-19 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-2317
Mitre link : CVE-2005-2317
CVE.ORG link : CVE-2005-2317
JSON object : View
Products Affected
shorewall
- shorewall
CWE