IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.
References
| Link | Resource |
|---|---|
| http://marc.info/?l=bugtraq&m=93312523904591&w=2 | |
| http://www.securityfocus.com/bid/543 | Patch Vendor Advisory |
| http://marc.info/?l=bugtraq&m=93312523904591&w=2 | |
| http://www.securityfocus.com/bid/543 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://marc.info/?l=bugtraq&m=93312523904591&w=2 - | |
| References | () http://www.securityfocus.com/bid/543 - Patch, Vendor Advisory |
Information
Published : 1999-07-27 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-1999-1018
Mitre link : CVE-1999-1018
CVE.ORG link : CVE-1999-1018
JSON object : View
Products Affected
linux
- linux_kernel
CWE
