extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.
Source: MITRE
Published: 2014-02-15
Updated: 2021-02-01
Type: NVD-CWE-noinfo
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
OR
cpe:2.3:a:netfilter:iptables:*:*:*:*:*:*:*:* versions up to 1.4.21 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
83563 | SUSE SLED10 / SLES10 Security Update : kernel (SUSE-SU-2012:1391-1) | Nessus | SuSE Local Security Checks | high |
74801 | openSUSE Security Update : kernel (openSUSE-SU-2012:1439-1) | Nessus | SuSE Local Security Checks | critical |
74661 | openSUSE Security Update : Kernel (openSUSE-SU-2012:0812-1) | Nessus | SuSE Local Security Checks | high |
74658 | openSUSE Security Update : Kernel (openSUSE-SU-2012:0799-1) | Nessus | SuSE Local Security Checks | critical |
64177 | SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 6547 / 6548 / 6550) | Nessus | SuSE Local Security Checks | high |
62676 | SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 8325) | Nessus | SuSE Local Security Checks | high |
62675 | SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 8324) | Nessus | SuSE Local Security Checks | high |