CVE DATABASE / CVE-2002-1978
CVE-2002-1978
CVSS 7.5 · HIGH
Summary
IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
CVSS 2.0 breakdown
| Base score | 7.5 (HIGH) |
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Confidentiality | PARTIAL |
| Integrity | PARTIAL |
| Availability | PARTIAL |
Weakness type (CWE)
Affected products
Darren_reed ipfilter
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-024.txt.asc
- http://securitytracker.com/id?1005442
- http://www.iss.net/security_center/static/10409.php
- http://www.kb.cert.org/vuls/id/328867
- http://www.securityfocus.com/bid/6010
Data: NIST NVD. NVD last modified 2026-04-16. Always verify against the vendor advisory before acting.