IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Software | From | Fixed in |
---|---|---|
freebsd / freebsd | - | 4.1.x |
openbsd / openbsd | 2.8 | 2.8.x |
darren_reed / ipfilter | - | 3.4.16.x |