3 results (0.023 seconds)

CVSS: 7.5EPSS: 0%CPEs: 82EXPL: 0

IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc http://securitytracker.com/id?1005442 http://www.iss.net/security_center/static/10409.php http://www.kb.cert.org/vuls/id/328867 http://www.securityfocus.com/bid/6010 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs. IPFilter 3.4.25 y anteriores establece un TTL distinto cuando un puerto está siendo filtrado a cuando no lo está, lo que permite a atacantes remotos identificar puertos filtrados comparando los TTL. • http://www.iss.net/security_center/static/8738.php http://www.securityfocus.com/archive/1/265188 http://www.securityfocus.com/bid/4403 • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html http://marc.info/?l=bugtraq&m=98679734015538&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 •