CVE-2012-2663

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

References

http://www.spinics.net/lists/netfilter-devel/msg21248.html

https://bugzilla.redhat.com/show_bug.cgi?id=826702

Details

Source: MITRE

Published: 2014-02-15

Updated: 2021-02-01

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:netfilter:iptables:*:*:*:*:*:*:*:* versions up to 1.4.21 (inclusive)

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
83563SUSE SLED10 / SLES10 Security Update : kernel (SUSE-SU-2012:1391-1)NessusSuSE Local Security Checks
high
74801openSUSE Security Update : kernel (openSUSE-SU-2012:1439-1)NessusSuSE Local Security Checks
critical
74661openSUSE Security Update : Kernel (openSUSE-SU-2012:0812-1)NessusSuSE Local Security Checks
high
74658openSUSE Security Update : Kernel (openSUSE-SU-2012:0799-1)NessusSuSE Local Security Checks
critical
64177SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 6547 / 6548 / 6550)NessusSuSE Local Security Checks
high
62676SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 8325)NessusSuSE Local Security Checks
high
62675SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 8324)NessusSuSE Local Security Checks
high