5 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

26 May 2009 — Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL. Desbordamiento de búfer en lib/load_http.c en ippool en Darren Reed IPFilter (también conocido como IP Filter) v4.1.31 permite a usuarios locales conseguir privilegios a través de vectores relacionados con un nombre de servidor largo en la URL. • http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 82EXPL: 0

31 Dec 2002 — IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 3%CPEs: 3EXPL: 1

18 Jun 2001 — IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 1

26 May 2000 — Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

15 Apr 1999 — IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file. • http://www.securityfocus.com/archive/1/13303 •