iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
References
Link | Resource |
---|---|
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325 | Exploit Issue Tracking Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2001-144.html | Broken Link |
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325 | Exploit Issue Tracking Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2001-144.html | Broken Link |
Configurations
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2001-144.html - Broken Link |
Information
Published : 2001-11-05 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1388
Mitre link : CVE-2001-1388
CVE.ORG link : CVE-2001-1388
JSON object : View
Products Affected
netfilter
- iptables
CWE
CWE-770
Allocation of Resources Without Limits or Throttling