Search criteria
17 vulnerabilities found for ipfilter by darren_reed
FKIE_CVE-2009-1476
Vulnerability from fkie_nvd - Published: 2009-05-26 15:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| darren_reed | ipfilter | 4.1.31 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:4.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C2E385-9268-49B9-82E6-00D093EC4F8E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en lib/load_http.c en ippool en Darren Reed IPFilter (tambi\u00e9n conocido como IP Filter) v4.1.31 permite a usuarios locales conseguir privilegios a trav\u00e9s de vectores relacionados con un nombre de servidor largo en la URL."
}
],
"id": "CVE-2009-1476",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-05-26T15:30:05.313",
"references": [
{
"source": "cve@mitre.org",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"source": "cve@mitre.org",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://securityreason.com/achievement_securityalert/62"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/35076"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1022272"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://securityreason.com/achievement_securityalert/62"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/35076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022272"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-1978
Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "26E4A0A0-E3CC-4C42-9BCD-023A76DEB6C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7DDDB4A5-D4E5-4316-8986-B794C8C33E4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9BC89B-FE9D-4B42-AB21-CEB798875FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D36EF6B7-D2D0-45D0-8930-FD79FA4D3869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3B2E5FF3-518F-450D-BD75-9A4288C6E5B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E17D71B7-FD7F-449B-88C6-3910947B711A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "075BB881-9210-4601-8294-50AB7249C715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A030894F-F327-46BC-A20B-549BC2636DE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "12D0D5D0-9592-4D53-9BBF-5431B30FADDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "68315B19-7EAB-40F5-9A68-030D45B20153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0184C1B2-0B35-484C-BDAA-145D06C28828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3B582D8D-C784-4617-B9EF-84D8266D1F75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B3CD7E-742F-43DD-9179-348D345EBCA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B304AA52-CA2E-4BB6-8083-DA23F5E3666B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8651AFB6-AE6B-476E-9040-686E8D3B3E2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9D06BB0F-7C38-4D0F-8F1D-DDEA5BA72FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DE1C3525-3BA8-4198-9932-394E77290863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "802826A3-6CF8-4821-A186-6BE979CE536D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ADEB76BF-F6DA-47DF-8212-85700E147D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4E6702-F0F0-42CA-A135-839C09C061E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "19E45505-ED50-4B82-B75E-930B358A9A43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "19DA89AA-ADD6-4E9B-BF2F-066533A93EC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1436E9-742A-4DD9-A1E7-807083F3799E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "E48E3505-8D18-461D-B087-D92636359DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1C14D21A-D868-4243-9746-7E83AE69A6AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D8E4E90D-B36B-4EC2-996A-D2733C65F360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3A77D625-8460-4E4E-A504-E97E37C939B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "19380123-9F42-4F75-8940-EE7C09612500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "5C8E384F-10C7-4FD6-B15F-1916DB9DB9F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D70A9AC2-F6B9-4391-8E5D-218FF1633F01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "882D1996-8DC4-4A6B-A78E-EDEBEA160D83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A8AF3B46-C364-440D-92D5-1CB4136F56EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9FA9F3-6A7F-4546-BF48-771B0105945B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80037D62-258E-4037-86DC-502BDDD8DB00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E5185D9-640C-4849-A018-C78B66CCE742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E4E0B0-995B-4115-BDA5-165B44795AFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD005F7-B67B-481F-BDB3-727CC801BAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "140AA53E-62B6-48C3-9074-6CEC4F6089FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA67F7C-3C37-4984-B668-C58B07C121FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4C67B056-B6F9-48F7-AB7F-8203EDEC0547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "55497D90-7903-42E8-9C44-57012A8DD9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EB3C13-9B23-489E-9784-8340629D2AE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "8A84FC92-0567-45E3-8355-07A31F82F6EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5442D120-BB1A-4CBD-BD93-329B10A2EFF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5E33DB56-7ED3-4AC5-BDF2-E4385BCADAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CF539F65-7FB4-40C2-8429-E0DA405A4D54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5F9210-DD20-4D86-B4F0-74F60A263F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A6763EC5-36E6-4E34-9268-F4F7EE1F3B02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "95406641-A7DB-4B9F-9212-7DF4E0EEC578",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "34A374CF-7F47-468F-A508-A1BCCB855197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "D988022E-2F8B-4134-B5BD-B516448B5F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA7B3A1-17F5-4E63-B3EA-B81C17B20D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "1459DC62-C5E7-4C77-BA7C-74E6B225E129",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7F5BB252-A315-4835-8336-5E014545E88B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5454FF-50A2-4930-B20C-F7F640B88F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "42F5B869-4CAD-4E68-AAF9-CBE7A833A221",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB9F76C-D145-4347-9A4C-1BD243AE68FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A01E8E-3D78-4BC3-9C02-CB03FA957C30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1D4063-E0DC-4046-9B2A-ED845CE9A0E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9731E97D-9B2A-4763-9D7C-0B0294C4648E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "32108513-D91F-4C99-8EE7-26B1D6C0C295",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5A71447D-53DF-4CA4-924C-2A7FDFE896C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "587AD4C8-F4B4-4E37-A477-0C29933EF47C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2B3061-DA23-4242-98FF-B0C7BFA3AB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A72F8D32-9DA4-4EC5-A90B-D1E7D5D7AADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5A59E7EB-2492-4F57-B2DE-5E87BE66D361",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3DD0D4-1A89-40C5-8DE9-DE618DA20ED7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D70F1AEB-6978-4F52-899C-0995FE51F779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "59CCC790-E71E-4CCD-AAF5-D7860C8E5190",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "CD56A050-563D-4FB4-9B89-BADFD62ED3B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5DE88E2D-FC71-47F8-9BB5-189BFC9D7365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD3C01B-2C0C-4FF4-92CC-9495D26CA80C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "9822472D-99A3-48E5-A96A-5B9A2B60F0BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D53362DF-1BC0-4816-8C0A-E27852DD3AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2A966144-3BD4-4CB8-9FDC-C4028819910E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A6907EC5-A0D0-448B-9B67-E1EA99700A07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8E0B777F-0870-4B2F-A809-9B232709B892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "050439CC-D269-4AF2-96D5-3A9D4FA6D5F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.25:*:*:*:*:*:*:*",
"matchCriteriaId": "4F24A9D1-B4C8-4216-9AD5-61572A550185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.26:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADDA4F6-BCD7-45A7-B46F-132F31E06B7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.27:*:*:*:*:*:*:*",
"matchCriteriaId": "391EF94E-1315-4078-9404-28A426AA2687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.28:*:*:*:*:*:*:*",
"matchCriteriaId": "AA6C86A1-2D96-487E-A494-FC80FC5E7857",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server."
}
],
"id": "CVE-2002-1978",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1005442"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/6010"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1005442"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/6010"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2001-0402
Vulnerability from fkie_nvd - Published: 2001-06-18 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16BB8130-BE94-44C4-B816-24ED25FA3EE7",
"versionEndIncluding": "3.4.16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A059A03-D039-4FDC-A4E5-548A5D828A4F",
"versionEndIncluding": "4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port."
}
],
"id": "CVE-2001-0402",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2001-06-18T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2000-0553
Vulnerability from fkie_nvd - Published: 2000-05-26 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| darren_reed | ipfilter | 3.3.15 | |
| darren_reed | ipfilter | 3.4.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5F9210-DD20-4D86-B4F0-74F60A263F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB9F76C-D145-4347-9A4C-1BD243AE68FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping \"return-rst\" and \"keep state\" rules, allows remote attackers to bypass access restrictions."
}
],
"id": "CVE-2000-0553",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2000-05-26T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/1377"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/1308"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/1377"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/1308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-1999-1244
Vulnerability from fkie_nvd - Published: 1999-04-15 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| darren_reed | ipfilter | 3.2.3 | |
| darren_reed | ipfilter | 3.2.4 | |
| darren_reed | ipfilter | 3.2.5 | |
| darren_reed | ipfilter | 3.2.6 | |
| darren_reed | ipfilter | 3.2.7 | |
| darren_reed | ipfilter | 3.2.8 | |
| darren_reed | ipfilter | 3.2.9 | |
| darren_reed | ipfilter | 3.2.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B3CD7E-742F-43DD-9179-348D345EBCA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B304AA52-CA2E-4BB6-8083-DA23F5E3666B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8651AFB6-AE6B-476E-9040-686E8D3B3E2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9D06BB0F-7C38-4D0F-8F1D-DDEA5BA72FA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DE1C3525-3BA8-4198-9932-394E77290863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "802826A3-6CF8-4821-A186-6BE979CE536D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ADEB76BF-F6DA-47DF-8212-85700E147D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:darren_reed:ipfilter:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4E6702-F0F0-42CA-A135-839C09C061E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file."
}
],
"id": "CVE-1999-1244",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "1999-04-15T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2009-1476 (GCVE-0-2009-1476)
Vulnerability from cvelistv5 – Published: 2009-05-26 15:16 – Updated: 2024-08-07 05:13
VLAI?
Summary
Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:13:25.568Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "35076",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35076"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"name": "1022272",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022272"
},
{
"name": "ipfilter-loadhttp-bo(50716)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"name": "20090522 IPFilter (ippool) 4.1.31 lib/load_http.c buffer overflow",
"tags": [
"third-party-advisory",
"x_refsource_SREASONRES",
"x_transferred"
],
"url": "http://securityreason.com/achievement_securityalert/62"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "35076",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35076"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"name": "1022272",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022272"
},
{
"name": "ipfilter-loadhttp-bo(50716)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"name": "20090522 IPFilter (ippool) 4.1.31 lib/load_http.c buffer overflow",
"tags": [
"third-party-advisory",
"x_refsource_SREASONRES"
],
"url": "http://securityreason.com/achievement_securityalert/62"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1476",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "35076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35076"
},
{
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c",
"refsource": "CONFIRM",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"name": "1022272",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022272"
},
{
"name": "ipfilter-loadhttp-bo(50716)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
},
{
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h",
"refsource": "CONFIRM",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"name": "20090522 IPFilter (ippool) 4.1.31 lib/load_http.c buffer overflow",
"refsource": "SREASONRES",
"url": "http://securityreason.com/achievement_securityalert/62"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-1476",
"datePublished": "2009-05-26T15:16:00",
"dateReserved": "2009-04-28T00:00:00",
"dateUpdated": "2024-08-07T05:13:25.568Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-1978 (GCVE-0-2002-1978)
Vulnerability from cvelistv5 – Published: 2005-06-28 04:00 – Updated: 2024-08-08 03:43
VLAI?
Summary
IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:43:33.605Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ip-filter-bypass-firewall(10409)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"name": "6010",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/6010"
},
{
"name": "1005442",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1005442"
},
{
"name": "VU#328867",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"name": "NetBSD-SA2002-024",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD",
"x_transferred"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-10-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-04-03T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ip-filter-bypass-firewall(10409)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"name": "6010",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/6010"
},
{
"name": "1005442",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1005442"
},
{
"name": "VU#328867",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"name": "NetBSD-SA2002-024",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-1978",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ip-filter-bypass-firewall(10409)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"name": "6010",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6010"
},
{
"name": "1005442",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1005442"
},
{
"name": "VU#328867",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"name": "NetBSD-SA2002-024",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-1978",
"datePublished": "2005-06-28T04:00:00",
"dateReserved": "2005-06-29T00:00:00",
"dateUpdated": "2024-08-08T03:43:33.605Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0515 (GCVE-0-2002-0515)
Vulnerability from cvelistv5 – Published: 2002-06-11 04:00 – Updated: 2024-08-08 02:49
VLAI?
Summary
IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:49:28.915Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020331 packet filter fingerprinting(open but closed, closed but filtered)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/265188"
},
{
"name": "4403",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4403"
},
{
"name": "firewall-rst-fingerprint(8738)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8738.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-03-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-06-15T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020331 packet filter fingerprinting(open but closed, closed but filtered)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/265188"
},
{
"name": "4403",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4403"
},
{
"name": "firewall-rst-fingerprint(8738)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8738.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0515",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020331 packet filter fingerprinting(open but closed, closed but filtered)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/265188"
},
{
"name": "4403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4403"
},
{
"name": "firewall-rst-fingerprint(8738)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8738.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0515",
"datePublished": "2002-06-11T04:00:00",
"dateReserved": "2002-06-07T00:00:00",
"dateUpdated": "2024-08-08T02:49:28.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0402 (GCVE-0-2001-0402)
Vulnerability from cvelistv5 – Published: 2001-09-18 04:00 – Updated: 2024-08-08 04:21
VLAI?
Summary
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:21:38.217Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FreeBSD-SA-01:32",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"name": "ipfilter-access-ports(6331)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
},
{
"name": "20010408 A fragmentation attack against IP Filter",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-04-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-02T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FreeBSD-SA-01:32",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"name": "ipfilter-access-ports(6331)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
},
{
"name": "20010408 A fragmentation attack against IP Filter",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0402",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FreeBSD-SA-01:32",
"refsource": "FREEBSD",
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"name": "ipfilter-access-ports(6331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
},
{
"name": "20010408 A fragmentation attack against IP Filter",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0402",
"datePublished": "2001-09-18T04:00:00",
"dateReserved": "2001-05-24T00:00:00",
"dateUpdated": "2024-08-08T04:21:38.217Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-1999-1244 (GCVE-0-1999-1244)
Vulnerability from cvelistv5 – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:02
VLAI?
Summary
IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:02:53.813Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19990415 FSA-99.04-IPFILTER-v3.2.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"name": "ipfilter-temp-file(2087)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-04-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-18T21:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19990415 FSA-99.04-IPFILTER-v3.2.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"name": "ipfilter-temp-file(2087)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-1999-1244",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19990415 FSA-99.04-IPFILTER-v3.2.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"name": "ipfilter-temp-file(2087)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-1999-1244",
"datePublished": "2001-09-12T04:00:00",
"dateReserved": "2001-08-31T00:00:00",
"dateUpdated": "2024-08-01T17:02:53.813Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0553 (GCVE-0-2000-0553)
Vulnerability from cvelistv5 – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.248Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ipfilter-firewall-race-condition(4994)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
},
{
"name": "1308",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1308"
},
{
"name": "20000525 Security Vulnerability in IPFilter 3.3.15 and 3.4.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"name": "1377",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/1377"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-05-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping \"return-rst\" and \"keep state\" rules, allows remote attackers to bypass access restrictions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2004-09-02T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ipfilter-firewall-race-condition(4994)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
},
{
"name": "1308",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1308"
},
{
"name": "20000525 Security Vulnerability in IPFilter 3.3.15 and 3.4.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"name": "1377",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/1377"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0553",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping \"return-rst\" and \"keep state\" rules, allows remote attackers to bypass access restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ipfilter-firewall-race-condition(4994)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
},
{
"name": "1308",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1308"
},
{
"name": "20000525 Security Vulnerability in IPFilter 3.3.15 and 3.4.3",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"name": "1377",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1377"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0553",
"datePublished": "2000-10-13T04:00:00",
"dateReserved": "2000-07-11T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.248Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-1476 (GCVE-0-2009-1476)
Vulnerability from nvd – Published: 2009-05-26 15:16 – Updated: 2024-08-07 05:13
VLAI?
Summary
Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:13:25.568Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "35076",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35076"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"name": "1022272",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022272"
},
{
"name": "ipfilter-loadhttp-bo(50716)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"name": "20090522 IPFilter (ippool) 4.1.31 lib/load_http.c buffer overflow",
"tags": [
"third-party-advisory",
"x_refsource_SREASONRES",
"x_transferred"
],
"url": "http://securityreason.com/achievement_securityalert/62"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-05-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "35076",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35076"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"name": "1022272",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022272"
},
{
"name": "ipfilter-loadhttp-bo(50716)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"name": "20090522 IPFilter (ippool) 4.1.31 lib/load_http.c buffer overflow",
"tags": [
"third-party-advisory",
"x_refsource_SREASONRES"
],
"url": "http://securityreason.com/achievement_securityalert/62"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1476",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "35076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35076"
},
{
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c",
"refsource": "CONFIRM",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c"
},
{
"name": "1022272",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022272"
},
{
"name": "ipfilter-loadhttp-bo(50716)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50716"
},
{
"name": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h",
"refsource": "CONFIRM",
"url": "http://cvsweb.netbsd.org/bsdweb.cgi/src/dist/ipf/lib/load_http.c.diff?r1=1.1\u0026r2=1.2\u0026f=h"
},
{
"name": "20090522 IPFilter (ippool) 4.1.31 lib/load_http.c buffer overflow",
"refsource": "SREASONRES",
"url": "http://securityreason.com/achievement_securityalert/62"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-1476",
"datePublished": "2009-05-26T15:16:00",
"dateReserved": "2009-04-28T00:00:00",
"dateUpdated": "2024-08-07T05:13:25.568Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-1978 (GCVE-0-2002-1978)
Vulnerability from nvd – Published: 2005-06-28 04:00 – Updated: 2024-08-08 03:43
VLAI?
Summary
IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:43:33.605Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ip-filter-bypass-firewall(10409)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"name": "6010",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/6010"
},
{
"name": "1005442",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1005442"
},
{
"name": "VU#328867",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"name": "NetBSD-SA2002-024",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD",
"x_transferred"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-10-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-04-03T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ip-filter-bypass-firewall(10409)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"name": "6010",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/6010"
},
{
"name": "1005442",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1005442"
},
{
"name": "VU#328867",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"name": "NetBSD-SA2002-024",
"tags": [
"vendor-advisory",
"x_refsource_NETBSD"
],
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-1978",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ip-filter-bypass-firewall(10409)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10409.php"
},
{
"name": "6010",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6010"
},
{
"name": "1005442",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1005442"
},
{
"name": "VU#328867",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/328867"
},
{
"name": "NetBSD-SA2002-024",
"refsource": "NETBSD",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-1978",
"datePublished": "2005-06-28T04:00:00",
"dateReserved": "2005-06-29T00:00:00",
"dateUpdated": "2024-08-08T03:43:33.605Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0515 (GCVE-0-2002-0515)
Vulnerability from nvd – Published: 2002-06-11 04:00 – Updated: 2024-08-08 02:49
VLAI?
Summary
IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:49:28.915Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020331 packet filter fingerprinting(open but closed, closed but filtered)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/265188"
},
{
"name": "4403",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4403"
},
{
"name": "firewall-rst-fingerprint(8738)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8738.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-03-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-06-15T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020331 packet filter fingerprinting(open but closed, closed but filtered)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/265188"
},
{
"name": "4403",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4403"
},
{
"name": "firewall-rst-fingerprint(8738)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8738.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0515",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020331 packet filter fingerprinting(open but closed, closed but filtered)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/265188"
},
{
"name": "4403",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4403"
},
{
"name": "firewall-rst-fingerprint(8738)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8738.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0515",
"datePublished": "2002-06-11T04:00:00",
"dateReserved": "2002-06-07T00:00:00",
"dateUpdated": "2024-08-08T02:49:28.915Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0402 (GCVE-0-2001-0402)
Vulnerability from nvd – Published: 2001-09-18 04:00 – Updated: 2024-08-08 04:21
VLAI?
Summary
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:21:38.217Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FreeBSD-SA-01:32",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"name": "ipfilter-access-ports(6331)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
},
{
"name": "20010408 A fragmentation attack against IP Filter",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-04-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-02T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "FreeBSD-SA-01:32",
"tags": [
"vendor-advisory",
"x_refsource_FREEBSD"
],
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"name": "ipfilter-access-ports(6331)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
},
{
"name": "20010408 A fragmentation attack against IP Filter",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0402",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FreeBSD-SA-01:32",
"refsource": "FREEBSD",
"url": "http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html"
},
{
"name": "ipfilter-access-ports(6331)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6331"
},
{
"name": "20010408 A fragmentation attack against IP Filter",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=98679734015538\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0402",
"datePublished": "2001-09-18T04:00:00",
"dateReserved": "2001-05-24T00:00:00",
"dateUpdated": "2024-08-08T04:21:38.217Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-1999-1244 (GCVE-0-1999-1244)
Vulnerability from nvd – Published: 2001-09-12 04:00 – Updated: 2024-08-01 17:02
VLAI?
Summary
IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:02:53.813Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19990415 FSA-99.04-IPFILTER-v3.2.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"name": "ipfilter-temp-file(2087)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-04-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-18T21:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19990415 FSA-99.04-IPFILTER-v3.2.10",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"name": "ipfilter-temp-file(2087)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-1999-1244",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19990415 FSA-99.04-IPFILTER-v3.2.10",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/13303"
},
{
"name": "ipfilter-temp-file(2087)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2087"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-1999-1244",
"datePublished": "2001-09-12T04:00:00",
"dateReserved": "2001-08-31T00:00:00",
"dateUpdated": "2024-08-01T17:02:53.813Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0553 (GCVE-0-2000-0553)
Vulnerability from nvd – Published: 2000-10-13 04:00 – Updated: 2024-08-08 05:21
VLAI?
Summary
Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T05:21:31.248Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ipfilter-firewall-race-condition(4994)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
},
{
"name": "1308",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/1308"
},
{
"name": "20000525 Security Vulnerability in IPFilter 3.3.15 and 3.4.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"name": "1377",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/1377"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2000-05-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping \"return-rst\" and \"keep state\" rules, allows remote attackers to bypass access restrictions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2004-09-02T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ipfilter-firewall-race-condition(4994)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
},
{
"name": "1308",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/1308"
},
{
"name": "20000525 Security Vulnerability in IPFilter 3.3.15 and 3.4.3",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"name": "1377",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/1377"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0553",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping \"return-rst\" and \"keep state\" rules, allows remote attackers to bypass access restrictions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ipfilter-firewall-race-condition(4994)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/4994"
},
{
"name": "1308",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/1308"
},
{
"name": "20000525 Security Vulnerability in IPFilter 3.3.15 and 3.4.3",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html"
},
{
"name": "1377",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1377"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0553",
"datePublished": "2000-10-13T04:00:00",
"dateReserved": "2000-07-11T00:00:00",
"dateUpdated": "2024-08-08T05:21:31.248Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}