IPFilter 3.4.25 and earlier sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/265188 | mailing list vendor advisory vdb entry third party advisory broken link |
http://www.securityfocus.com/bid/4403 | vendor advisory exploit vdb entry third party advisory broken link |
http://www.iss.net/security_center/static/8738.php | vdb entry broken link vendor advisory |