ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/2293 | patch vendor advisory vdb entry exploit |
http://www.ciac.org/ciac/bulletins/l-029.shtml | third party advisory government resource |
http://www.security-express.com/archives/bugtraq/2001-01/0424.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5998 | vdb entry |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc | patch vendor advisory |
http://www.osvdb.org/1743 | vdb entry |