CVE-2001-1388

iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
References
Link Resource
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325 Exploit Issue Tracking Patch Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2001-144.html Broken Link
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325 Exploit Issue Tracking Patch Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2001-144.html Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:netfilter:iptables:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:37

Type Values Removed Values Added
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325 - Exploit, Issue Tracking, Patch, Third Party Advisory () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=53325 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2001-144.html - Broken Link () http://rhn.redhat.com/errata/RHSA-2001-144.html - Broken Link

Information

Published : 2001-11-05 05:00

Updated : 2024-11-20 23:37


NVD link : CVE-2001-1388

Mitre link : CVE-2001-1388

CVE.ORG link : CVE-2001-1388


JSON object : View

Products Affected

netfilter

  • iptables
CWE
CWE-770

Allocation of Resources Without Limits or Throttling