Netfilter Iptables vulnerabilities

5 known vulnerabilities affecting netfilter/iptables.

Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2LOW1

Vulnerabilities

Page 1 of 1
CVE-2019-11360MEDIUMCVSS 4.2v1.8.22019-07-12
CVE-2019-11360 [MEDIUM] CWE-787 CVE-2019-11360: A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) c A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.
nvdosv
CVE-2012-2663HIGHCVSS 7.5≤ 1.4.212014-02-15
CVE-2012-2663 [HIGH] CVE-2012-2663: extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.
nvd
CVE-2004-0986HIGHCVSS 7.5≥ 0, < 1.2.11-42005-03-01
CVE-2004-0986 [HIGH] CVE-2004-0986: Iptables before 1 Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
osv
CVE-2001-1388MEDIUMCVSS 5.0fixed in 1.2.42001-11-05
CVE-2001-1388 [MEDIUM] CWE-770 CVE-2001-1388: iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
nvd
CVE-2001-1387LOWCVSS 2.1fixed in 1.2.42001-11-05
CVE-2001-1387 [LOW] CWE-203 CVE-2001-1387: iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--r iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak.
nvd