Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2019-11360

Disclosure Date: July 12, 2019 (last updated February 15, 2024)
A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.
Attacker Value
Unknown

CVE-2015-6496

Disclosure Date: August 24, 2015 (last updated October 05, 2023)
conntrackd in conntrack-tools 1.4.2 and earlier does not ensure that the optional kernel modules are loaded before using them, which allows remote attackers to cause a denial of service (crash) via a (1) DCCP, (2) SCTP, or (3) ICMPv6 packet.
0
Attacker Value
Unknown

CVE-2012-2663

Disclosure Date: February 15, 2014 (last updated November 08, 2023)
extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.
0
Attacker Value
Unknown

CVE-2001-1387

Disclosure Date: November 05, 2001 (last updated February 22, 2025)
iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak.
0
Attacker Value
Unknown

CVE-2001-1388

Disclosure Date: November 05, 2001 (last updated February 22, 2025)
iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
0