Vulnerability Description
Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Darren Reed | Ipfilter | 3.3.15 |
References
- http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.htmlExploitPatchVendor Advisory
- http://www.osvdb.org/1377
- http://www.securityfocus.com/bid/1308PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/4994
- http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.htmlExploitPatchVendor Advisory
- http://www.osvdb.org/1377
- http://www.securityfocus.com/bid/1308PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/4994
FAQ
What is CVE-2000-0553?
CVE-2000-0553 is a vulnerability with a CVSS score of 2.6 (LOW). Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.
How severe is CVE-2000-0553?
CVE-2000-0553 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0553?
Check the references section above for vendor advisories and patch information. Affected products include: Darren Reed Ipfilter.