IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.
CVSS v2.0 Score
7.5
/ 10.0
HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Information
- Published
- 27 juil. 1999
- Updated
- 16 avr. 2026
- Status
- Modified
- Source
- cve@mitre.org
Affected products
linux linux kernelAll Linux Kernel CVEs →
Versions : 2.2.10, 2.2.0
Weaknesses (CWE)
NVD-CWE-Other
References (4)
Monitor your products
Get automatic alerts for every new CVE affecting your equipment.