CVE Vulnerabilities

CVE-2012-2663

Published: Feb 15, 2014 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
6.4 MODERATE
AV:N/AC:L/Au:N/C:P/I:N/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in –syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

Affected Software

NameVendorStart VersionEnd Version
IptablesNetfilter*1.4.21 (including)
IptablesUbuntuartful*
IptablesUbuntubionic*
IptablesUbuntucosmic*
IptablesUbuntudevel*
IptablesUbuntudisco*
IptablesUbuntueoan*
IptablesUbuntuesm-infra-legacy/trusty*
IptablesUbuntuesm-infra/bionic*
IptablesUbuntuesm-infra/focal*
IptablesUbuntuesm-infra/xenial*
IptablesUbuntufocal*
IptablesUbuntuhardy*
IptablesUbuntulucid*
IptablesUbuntunatty*
IptablesUbuntuoneiric*
IptablesUbuntuprecise*
IptablesUbuntuprecise/esm*
IptablesUbuntuquantal*
IptablesUbunturaring*
IptablesUbuntusaucy*
IptablesUbuntutrusty*
IptablesUbuntutrusty/esm*
IptablesUbuntuupstream*
IptablesUbuntuutopic*
IptablesUbuntuvivid*
IptablesUbuntuvivid/stable-phone-overlay*
IptablesUbuntuvivid/ubuntu-core*
IptablesUbuntuwily*
IptablesUbuntuxenial*
IptablesUbuntuyakkety*
IptablesUbuntuzesty*

References