Nessus Plugin #12118
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Firewall ECE-bit bypass
- Family:
- Misc.
- Category:
- infos
- Copyright:
- This script is Copyright (C) 2004 Andrey I. Zakharov and John Lampe
- Summary:
- Firewall ECE-bit bypass
- Version:
- $Revision: 1.5 $
- Cve_id:
- CVE-2001-0183
- Bugtraq_id:
- 2293
- Xrefs:
- -
- Description:
The remote host seems vulnerable to a bug wherein a remote
attacker can circumvent the firewall by setting the ECE bit
within the TCP flags field. At least one firewall (ipfw) is
known to exhibit this sort of behavior.
Known vulnerable systems include all FreeBSD 3.x ,4.x, 3.5-STABLE,
and 4.2-STABLE.
Solution: If you are running FreeBSD 3.X, 4.x, 3.5-STABLE,
4.2-STABLE, upgrade your firewall. If you are not running FreeBSD,
contact your firewall vendor for a patch.
See also: http://www.securityfocus.com/bid/2293/
Risk Factor: High
Generiert am 27.04.2005 um 18:49:54 Uhr.