Total vulnerabilities in the database
IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 2.2.0 | 2.2.0.x |
linux / linux_kernel | - | 2.2.10.x |