Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2002-1978

Опубликовано: 31 дек. 2002
Источник: nvd
CVSS2: 7.5
EPSS Низкий

Описание

IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:darren_reed:ipfilter:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.7:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.8:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.9:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.1.10:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.8:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.9:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.10:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.11:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.12:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.13:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.14:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.15:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.16:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.17:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.18:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.19:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.20:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.21:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.2.22:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.7:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.8:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.9:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.10:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.11:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.12:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.13:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.14:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.15:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.16:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.17:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.18:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.19:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.20:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.21:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.3.22:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.6:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.7:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.8:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.9:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.10:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.11:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.12:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.13:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.14:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.15:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.16:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.17:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.18:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.19:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.20:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.21:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.22:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.23:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.24:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.25:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.26:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.27:*:*:*:*:*:*:*
cpe:2.3:a:darren_reed:ipfilter:3.4.28:*:*:*:*:*:*:*

EPSS

Процентиль: 76%
0.00968
Низкий

7.5 High

CVSS2

Дефекты

CWE-264

Связанные уязвимости

github
больше 3 лет назад

IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.

EPSS

Процентиль: 76%
0.00968
Низкий

7.5 High

CVSS2

Дефекты

CWE-264