VYPR

Ipfilter

by Darren Reed

CVEs (5)

  • CVE-2001-0402Jun 18, 2001
    risk 0.03cvss epss 0.03

    IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.

  • CVE-2009-1476May 26, 2009
    risk 0.00cvss epss 0.00

    Buffer overflow in lib/load_http.c in ippool in Darren Reed IPFilter (aka IP Filter) 4.1.31 allows local users to gain privileges via vectors involving a long hostname in a URL.

  • CVE-2002-1978Dec 31, 2002
    risk 0.00cvss epss 0.01

    IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.

  • CVE-2000-0553May 26, 2000
    risk 0.00cvss epss 0.00

    Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.

  • CVE-1999-1244Apr 15, 1999
    risk 0.00cvss epss 0.00

    IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file.