CVE-2012-2663 The advisory has been revoked - it doesn't affect any version of package iptables Open this link in a new tab
Threat Intelligence
EPSS
0.48% (76th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UBUNTU1604-IPTABLES-287326
- published 15 Feb 2014
- disclosed 15 Feb 2014
Introduced: 15 Feb 2014
CVE-2012-2663 Open this link in a new tabAmendment
The Ubuntu
security team deemed this advisory irrelevant for Ubuntu:16.04
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream iptables
package and not the iptables
package as distributed by Ubuntu
.
extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.