Netfilter

Iptables

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.43%
  • Veröffentlicht 12.07.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:20:56

A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.

  • EPSS 0.24%
  • Veröffentlicht 15.02.2014 14:57:07
  • Zuletzt bearbeitet 11.04.2025 00:51:21

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less r...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 05.11.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information l...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 05.11.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.