ID CVE-2002-0514
Summary PF in OpenBSD 3.0 with the return-rst rule sets the TTL to 128 in the RST packet, which allows remote attackers to determine if a port is being filtered because the TTL is different than the default TTL.
References
Vulnerable Configurations
  • cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
    cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 14-02-2024 - 15:07)
Impact:
Exploitability:
CWE CWE-203
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 4401
bugtraq 20020331 packet filter fingerprinting(open but closed, closed but filtered)
xf firewall-rst-fingerprint(8738)
Last major update 14-02-2024 - 15:07
Published 12-08-2002 - 04:00
Last modified 14-02-2024 - 15:07
Back to Top