Executive Summary

Informations
NameCVE-2001-0402First vendor Publication2001-06-18
VendorCveLast vendor Modification2017-10-09

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides user account access : Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0402

CPE : Common Platform Enumeration

TypeDescriptionCount
Application70
Os224
Os1

Open Source Vulnerability Database (OSVDB)

idDescription
4692IPFilter Arbitrary UDP/TCP Port Access

Sources (Detail)

SourceUrl
BUGTRAQ http://marc.info/?l=bugtraq&m=98679734015538&w=2
FREEBSD http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/6331

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
DateInformations
2019-03-21 01:00:57
  • Multiple Updates
2019-03-19 12:01:25
  • Multiple Updates
2017-10-10 09:23:20
  • Multiple Updates
2017-03-30 12:00:41
  • Multiple Updates
2016-10-18 12:00:54
  • Multiple Updates
2016-04-27 09:20:51
  • Multiple Updates
2013-05-11 12:03:58
  • Multiple Updates