5 results (0.006 seconds)

CVSS: 9.8EPSS: 1%CPEs: 82EXPL: 0

31 Dec 2002 — IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

11 Jun 2002 — IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs. IPFilter 3.4.25 y anteriores establece un TTL distinto cuando un puerto está siendo filtrado a cuando no lo está, lo que permite a atacantes remotos identificar puertos filtrados comparando los TTL. • http://www.iss.net/security_center/static/8738.php • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 3%CPEs: 3EXPL: 1

18 Jun 2001 — IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 1

26 May 2000 — Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

15 Apr 1999 — IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file. • http://www.securityfocus.com/archive/1/13303 •