IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/543 | vdb entry patch vendor advisory |
http://marc.info/?l=bugtraq&m=93312523904591&w=2 | mailing list |