IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
| Software | From | Fixed in |
|---|---|---|
| darren_reed / ipfilter | - | 3.4.16.x |
| openbsd / openbsd | 2.8 | 2.8.x |
| freebsd / freebsd | - | 4.1.x |