5 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL. Desbordamiento de búfer en lib/load_http.c en ippool en Darren Reed IPFilter (también conocido como IP Filter) v4.1.31 permite a usuarios locales conseguir privilegios a través de vectores relacionados con un nombre de servidor largo en la URL. • http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1&r2=1.2&f=h http://securityreason.com/achievement_securityalert/62 http://www.securityfocus.com/bid/35076 http://www.securitytracker.com/id?1022272 https://exchange.xforce.ibmcloud.com/vulnerabilities/50716 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 82EXPL: 0

IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc http://securitytracker.com/id?1005442 http://www.iss.net/security_center/static/10409.php http://www.kb.cert.org/vuls/id/328867 http://www.securityfocus.com/bid/6010 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html http://marc.info/?l=bugtraq&m=98679734015538&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 1

Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html http://www.osvdb.org/1377 http://www.securityfocus.com/bid/1308 https://exchange.xforce.ibmcloud.com/vulnerabilities/4994 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file. • http://www.securityfocus.com/archive/1/13303 https://exchange.xforce.ibmcloud.com/vulnerabilities/2087 •