Vulnerability Details : CVE-2002-1978
IPFilter 3.1.1 through 3.4.28 allows remote attackers to bypass firewall rules by sending a PASV command string as the argument of another command to an FTP server, which generates a response that contains the string, causing IPFilter to treat the response as if it were a legitimate PASV command from the server.
Products affected by CVE-2002-1978
- cpe:2.3:a:darren_reed:ipfilter:3.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.25:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.20:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.23:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.24:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.26:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.27:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.22:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.17:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.20:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.21:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.22:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.19:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.19:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.21:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.28:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.17:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.2.21:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.18:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.20:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:darren_reed:ipfilter:3.4.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1978
0.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1978
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2002-1978
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2002-1978
Jump to