Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g725-p8m6-82j4

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

EPSS

Процентиль: 47%
0.00244
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

redhat
около 14 лет назад

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

nvd
почти 12 лет назад

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

debian
почти 12 лет назад

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP S ...

CVSS3: 7.3
fstec
почти 14 лет назад

Уязвимость компонента extensions/libxt_tcp.c интерфейса управления работой межсетевого экрана Iptables, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 47%
0.00244
Низкий