FreeBSD ppp deny_incoming Vulnerability

BID:1974

Info

FreeBSD ppp deny_incoming Vulnerability

Bugtraq ID: 1974
Class: Design Error
CVE:
Remote: Yes
Local: No
Published: Nov 14 2000 12:00AM
Updated: Nov 14 2000 12:00AM
Credit: First published in FreeBSD Advisory FreeBSD-SA-00:70 on Nov 14, 2000.
Vulnerable: FreeBSD FreeBSD 4.1.1 -STABLE
FreeBSD FreeBSD 4.1
FreeBSD FreeBSD 4.0
FreeBSD FreeBSD 3.5.1
FreeBSD FreeBSD 3.5
Not Vulnerable:

Discussion

FreeBSD ppp deny_incoming Vulnerability

ppp is a utility used for handling point-to-point network connections in unix systems. The FreeBSD version of ppp also facilitates NAT, or network address translation for proxied communication between networks.

There is an option in ppp, "nat deny_incoming" which can be used as a broad, simple "firewall rule". It tells the machine performing nat not to let anything pass through the gateway that is not part of an existing nat session. Code was added to this functonality to permit certain types of data through the nat gateway that introduced a bug resulting in all traffic passing through, despite the "deny_incoming" directive.

This may result in a violation of security policy and can lead to attacks on the internal network behind the gateway.

Exploit / POC

FreeBSD ppp deny_incoming Vulnerability

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].

Solution / Fix

FreeBSD ppp deny_incoming Vulnerability

Solution:
FreeBSD has released a patch to correct this vulnerability.


FreeBSD FreeBSD 3.5

FreeBSD FreeBSD 3.5.1

FreeBSD FreeBSD 4.0

FreeBSD FreeBSD 4.1

References

FreeBSD ppp deny_incoming Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report