extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.
References
Link | Resource |
---|---|
http://www.spinics.net/lists/netfilter-devel/msg21248.html | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=826702 | Issue Tracking Mitigation Patch Third Party Advisory |
http://www.spinics.net/lists/netfilter-devel/msg21248.html | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=826702 | Issue Tracking Mitigation Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.spinics.net/lists/netfilter-devel/msg21248.html - Patch, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=826702 - Issue Tracking, Mitigation, Patch, Third Party Advisory |
07 Nov 2023, 02:10
Type | Values Removed | Values Added |
---|---|---|
Summary | extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant. |
Information
Published : 2014-02-15 14:57
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2663
Mitre link : CVE-2012-2663
CVE.ORG link : CVE-2012-2663
JSON object : View
Products Affected
netfilter
- iptables
CWE