Netfilter

Iptables

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.43%
  • Veröffentlicht 12.07.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:56

A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.

  • EPSS 0.36%
  • Veröffentlicht 15.02.2014 14:57:07
  • Zuletzt bearbeitet 29.04.2026 01:13:23

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less r...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 05.11.2001 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information l...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 05.11.2001 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.