Out-of-Bounds

Affecting iptables package, versions *

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.

References

CVSS Score

4.2
low severity
  • Attack Vector
    Local
  • Attack Complexity
    Low
  • Privileges Required
    High
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    None
  • Integrity
    None
  • Availability
    High
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
CVE
CVE-2019-11360
CWE
CWE-119
Snyk ID
SNYK-DEBIAN10-IPTABLES-451768
Disclosed
12 Jul, 2019
Published
24 Jul, 2019