Executive Summary
Summary | |
---|---|
Title | New iptables packages fix modprobe failure |
Informations | |||
---|---|---|---|
Name | DSA-580 | First vendor Publication | 2004-11-01 |
Vendor | Debian | Last vendor Modification | 2004-11-01 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Faheem Mitha noticed that the iptables command, an administration tool for IPv4 packet filtering and NAT, did not always load the required modules on it own as it was supposed to. This could lead to firewall rules not being loaded on system startup. This caused a failure in connection with rules provided by lokkit at least. For the stable distribution (woody) this problem has been fixed in version 1.2.6a-5.0woody2. For the unstable distribution (sid) this problem has been fixed in version 1.2.11-4. We recommend that you upgrade your iptables package. |
Original Source
Url : http://www.debian.org/security/2004/dsa-580 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 580-1 (iptables) File : nvt/deb_580_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
11351 | iptables Module Loading Failure iptables contains a flaw that may allow a malicious user to bypass firewall rules. The issue is triggered when iptables fails to load required modules in iptables.c and ip6tables.c under certain configurations. It is possible that the flaw may prohibit the firewall rules from being applied without notifying the victim of the problem resulting in a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-81-1.nasl - Type : ACT_GATHER_INFO |
2004-11-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-580.nasl - Type : ACT_GATHER_INFO |
2004-11-05 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-125.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:33 |
|