IPChains in Linux kernels 2.2.10 and previous versions does not reassemble IP fragments before checking the header information, which allows a remote malicious user to bypass the filtering rules using several fragments with 0 offsets.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
linux linux kernel 2.2.0 |