Total vulnerabilities in the database
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
Software | From | Fixed in |
---|---|---|
darren_reed / ipfilter | - | 3.4.16.x |
openbsd / openbsd | 2.8 | 2.8.x |
freebsd / freebsd | - | 4.1.x |