cvelist/2001/1xxx/CVE-2001-1056.json

83 lines
2.5 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2001-1056",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IRC DCC helper in the ip_masq_irc IP masquerading module 2.2 allows remote attackers to bypass intended firewall restrictions by causing the target system to send a \"DCC SEND\" request to a malicious server which listens on port 6667, which may cause the module to believe that the traffic is a valid request and allow the connection to the port specified in the DCC SEND request."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20010730 [RAZOR] Linux kernel IP masquerading vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html"
},
{
"name" : "20010730 Re: [RAZOR] Linux kernel IP masquerading vulnerability (_actual_ patch)",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html"
},
{
"name" : "3117",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3117"
},
{
"name" : "linux-ipmasqirc-bypass-protection(6923)",
"refsource" : "XF",
"url" : "http://www.iss.net/security_center/static/6923.php"
},
{
"name" : "1916",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/1916"
}
]
}
}