Vulnerability Name: | CVE-1999-1018 (CCN-6516) | ||||||||
Assigned: | 1999-07-27 | ||||||||
Published: | 1999-07-27 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Tue, 27 Jul 1999 18:56:22 +0200 Linux 2.2.10 ipchains Advisory Source: MITRE Type: CNA CVE-1999-1018 Source: BUGTRAQ Type: UNKNOWN 19990727 Linux 2.2.10 ipchains Advisory Source: CCN Type: The Linux Kernel Archives Web site The Linux Kernel Archives Source: CCN Type: OSVDB ID: 6104 ipchains Fragmentation Header Port Rewrite Filter Bypass Source: CCN Type: BID-376 Linux IP Fragment Overlap Vulnerability Source: BID Type: Patch, Vendor Advisory 543 Source: CCN Type: BID-543 Linux IPChains Fragment Overlap Vulnerability Source: XF Type: UNKNOWN linux-ipchains-bypass-filter(6516) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |