7.5
CVSSv2

CVE-2001-0183

Published: 26/03/2001 Updated: 10/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

ipfw and ip6fw in FreeBSD 4.2 and previous versions allows remote malicious users to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection.

Vulnerable Product Search on Vulmon Subscribe to Product

freebsd freebsd 3.5

freebsd freebsd 3.5.1

freebsd freebsd 3.0

freebsd freebsd 3.1

freebsd freebsd 4.1

freebsd freebsd 4.1.1

freebsd freebsd 3.3

freebsd freebsd 3.4

freebsd freebsd 4.2

freebsd freebsd 4.0

Exploits

source: wwwsecurityfocuscom/bid/2293/info There exists a serious vulnerability in FreeBSD's implementation of packet filtering for IPv4 and IPv6 The vulnerability exists in situations where a filtering rule permits packets through if they are part of an established connection It is possible for packets that are not part of an established con ...