CVE-2005-2317

Shorewall 2.4.x before 2.4.1, 2.2.x before 2.2.5, and 2.0.x before 2.0.17, when MACLIST_TTL is greater than 0 or MACLIST_DISPOSITION is set to ACCEPT, allows remote attackers with an accepted MAC address to bypass other firewall rules or policies.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:shorewall:shorewall:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.0a:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.2c:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.2d:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.2e:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.2f:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.3a:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.3b:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.3c:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.4.0_rc1:*:*:*:*:*:*:*
cpe:2.3:a:shorewall:shorewall:2.4.0_rc2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html - Patch, Vendor Advisory () http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html - Patch, Vendor Advisory
References () http://secunia.com/advisories/16087 - Patch, Vendor Advisory () http://secunia.com/advisories/16087 - Patch, Vendor Advisory
References () http://secunia.com/advisories/17110 - () http://secunia.com/advisories/17110 -
References () http://secunia.com/advisories/17113 - () http://secunia.com/advisories/17113 -
References () http://shorewall.net/News.htm#20050717 - Patch, Vendor Advisory () http://shorewall.net/News.htm#20050717 - Patch, Vendor Advisory
References () http://www.debian.org/security/2005/dsa-849 - () http://www.debian.org/security/2005/dsa-849 -
References () http://www.gentoo.org/security/en/glsa/glsa-200507-20.xml - () http://www.gentoo.org/security/en/glsa/glsa-200507-20.xml -
References () http://www.securityfocus.com/bid/14292 - () http://www.securityfocus.com/bid/14292 -
References () http://www.ubuntu.com/usn/usn-197-1 - () http://www.ubuntu.com/usn/usn-197-1 -

Information

Published : 2005-07-19 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2005-2317

Mitre link : CVE-2005-2317

CVE.ORG link : CVE-2005-2317


JSON object : View

Products Affected

shorewall

  • shorewall