Bug 36659 - Security flaw in IPTables using FTP PORT
Summary: Security flaw in IPTables using FTP PORT
Keywords:
Status: CLOSED DUPLICATE of bug 36580
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: iptables
Version: 7.1
Hardware: i386
OS: Linux
high
medium
Target Milestone: ---
Assignee: Bernhard Rosenkraenzer
QA Contact: David Lawrence
URL: http://netfilter.samba.org/security-fix/
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2001-04-19 14:34 UTC by Brian Z
Modified: 2007-03-27 03:43 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2001-04-19 14:34:23 UTC
Embargoed:


Attachments (Terms of Use)

Description Brian Z 2001-04-19 14:34:19 UTC
Information from above URL:

If an attacker can establish an FTP connection passing through a Linux
2.4.x IPTables firewall with the state options allowing "related"
connections (almost 100% do), he can insert entries into the firewall's
RELATED ruleset table allowing the FTP Server to connect to any host and
port protected by the firewalls rules,including the firewall itself.

More information and patch can be found at above URL

Comment 1 Bernhard Rosenkraenzer 2001-04-19 16:41:49 UTC

*** This bug has been marked as a duplicate of 36580 ***


Note You need to log in before you can comment on or make changes to this bug.