CVE-2002-1978
https://notcve.org/view.php?id=CVE-2002-1978
IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc http://securitytracker.com/id?1005442 http://www.iss.net/security_center/static/10409.php http://www.kb.cert.org/vuls/id/328867 http://www.securityfocus.com/bid/6010 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2002-0515
https://notcve.org/view.php?id=CVE-2002-0515
IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs. IPFilter 3.4.25 y anteriores establece un TTL distinto cuando un puerto está siendo filtrado a cuando no lo está, lo que permite a atacantes remotos identificar puertos filtrados comparando los TTL. • http://www.iss.net/security_center/static/8738.php http://www.securityfocus.com/archive/1/265188 http://www.securityfocus.com/bid/4403 • CWE-203: Observable Discrepancy •
CVE-2001-0402 – IPFilter 3.x - Fragment Rule Bypass
https://notcve.org/view.php?id=CVE-2001-0402
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html http://marc.info/?l=bugtraq&m=98679734015538&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 •
CVE-2000-0553
https://notcve.org/view.php?id=CVE-2000-0553
Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html http://www.osvdb.org/1377 http://www.securityfocus.com/bid/1308 https://exchange.xforce.ibmcloud.com/vulnerabilities/4994 •
CVE-1999-1244
https://notcve.org/view.php?id=CVE-1999-1244
IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file. • http://www.securityfocus.com/archive/1/13303 https://exchange.xforce.ibmcloud.com/vulnerabilities/2087 •