Shorewall 2.4.x before 2.4.1, 2.2.x before 2.2.5, and 2.0.x before 2.0.17, when MACLIST_TTL is greater than 0 or MACLIST_DISPOSITION is set to ACCEPT, allows remote attackers with an accepted MAC address to bypass other firewall rules or policies.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/14292 | vdb entry |
http://www.debian.org/security/2005/dsa-849 | vendor advisory |
http://shorewall.net/News.htm#20050717 | patch vendor advisory |
http://secunia.com/advisories/17110 | third party advisory |
http://www.ubuntu.com/usn/usn-197-1 | vendor advisory |
http://secunia.com/advisories/17113 | third party advisory |
http://secunia.com/advisories/16087 | patch vendor advisory third party advisory |
http://www.gentoo.org/security/en/glsa/glsa-200507-20.xml | vendor advisory |
http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html | patch vendor advisory mailing list |