Описание
The TCP implementation in various BSD operating systems (tcp_input.c) does not properly block connections to broadcast addresses, which could allow remote attackers to bypass intended filters via packets with a unicast link layer address and an IP broadcast address.
The TCP implementation in various BSD operating systems (tcp_input.c) does not properly block connections to broadcast addresses, which could allow remote attackers to bypass intended filters via packets with a unicast link layer address and an IP broadcast address.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-0381
- http://cvsweb.netbsd.org/bsdweb.cgi/syssrc/sys/netinet/tcp_input.c.diff?r1=1.136&r2=1.137
- http://online.securityfocus.com/archive/1/262733
- http://www.FreeBSD.org/cgi/query-pr.cgi?pr=35022
- http://www.iss.net/security_center/static/8485.php
- http://www.openbsd.org/cgi-bin/cvsweb/src/sys/netinet/tcp_input.c.diff?r1=1.109&r2=1.110
- http://www.osvdb.org/5308
- http://www.securityfocus.com/bid/4309
EPSS
CVE ID
Связанные уязвимости
The TCP implementation in various BSD operating systems (tcp_input.c) does not properly block connections to broadcast addresses, which could allow remote attackers to bypass intended filters via packets with a unicast link layer address and an IP broadcast address.
EPSS