Description
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Thomas Lopatic · textremoteunix
https://www.exploit-db.com/exploits/20730
References (3)
Core 3
Core References
Patch, Vendor Advisory vendor-advisory
x_refsource_freebsd
http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/6331
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=98679734015538&w=2
Scores
EPSS
0.0271
EPSS Percentile
86.1%
Details
Status
published
Products (3)
darren_reed/ipfilter
< 3.4.16
freebsd/freebsd
< 4.1
openbsd/openbsd
2.8
Published
Jun 18, 2001
Tracked Since
Feb 18, 2026