Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2019-11360
Disclosure Date: July 12, 2019 (last updated February 15, 2024)
A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.
0
Attacker Value
Unknown
CVE-2015-8326
Disclosure Date: June 07, 2017 (last updated November 26, 2024)
The IPTables-Parse module before 1.6 for Perl allows local users to write to arbitrary files owned by the current user.
0
Attacker Value
Unknown
CVE-2012-2663
Disclosure Date: February 15, 2014 (last updated November 08, 2023)
extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.
0
Attacker Value
Unknown
CVE-2005-1878
Disclosure Date: June 09, 2005 (last updated February 22, 2025)
GIPTables Firewall 1.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on the temp.ip.addresses temporary file.
0
Attacker Value
Unknown
CVE-2004-0986
Disclosure Date: March 01, 2005 (last updated February 22, 2025)
Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
0
Attacker Value
Unknown
CVE-2001-1387
Disclosure Date: November 05, 2001 (last updated February 22, 2025)
iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak.
0
Attacker Value
Unknown
CVE-2001-1388
Disclosure Date: November 05, 2001 (last updated February 22, 2025)
iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
0