ipfw and ip6fw in FreeBSD 4.2 and previous versions allows remote malicious users to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
freebsd freebsd 3.5 |
||
freebsd freebsd 3.5.1 |
||
freebsd freebsd 3.0 |
||
freebsd freebsd 3.1 |
||
freebsd freebsd 4.1 |
||
freebsd freebsd 4.1.1 |
||
freebsd freebsd 3.3 |
||
freebsd freebsd 3.4 |
||
freebsd freebsd 4.2 |
||
freebsd freebsd 4.0 |