VYPR
Unrated severityNVD Advisory· Published Dec 31, 2002· Updated Apr 16, 2026

CVE-2002-1978

CVE-2002-1978

Description

IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.

Affected products

82
  • cpe:2.3:a:darren_reed:ipfilter:3.1.1:*:*:*:*:*:*:*+ 81 more
    • cpe:2.3:a:darren_reed:ipfilter:3.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.10:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.7:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.8:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.1.9:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.10:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.11:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.12:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.13:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.14:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.15:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.16:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.17:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.18:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.19:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.20:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.21:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.22:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.2.9:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.12:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.13:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.14:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.15:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.16:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.17:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.18:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.19:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.20:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.21:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.22:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.12:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.13:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.14:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.15:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.16:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.17:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.18:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.19:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.20:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.21:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.22:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.23:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.24:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.25:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.26:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.27:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.28:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:darren_reed:ipfilter:3.4.9:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.