IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 | vdb entry |
http://marc.info/?l=bugtraq&m=98679734015538&w=2 | mailing list |