Bug 36659 - Security flaw in IPTables using FTP PORT
Security flaw in IPTables using FTP PORT
Status: CLOSED DUPLICATE of bug 36580
Product: Red Hat Linux
Classification: Retired
Component: iptables (Show other bugs)
i386 Linux
high Severity medium
: ---
: ---
Assigned To: Bernhard Rosenkraenzer
David Lawrence
: Security
Depends On:
  Show dependency treegraph
Reported: 2001-04-19 10:34 EDT by Brian Z
Modified: 2007-03-26 23:43 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2001-04-19 10:34:23 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Brian Z 2001-04-19 10:34:19 EDT
Information from above URL:

If an attacker can establish an FTP connection passing through a Linux
2.4.x IPTables firewall with the state options allowing "related"
connections (almost 100% do), he can insert entries into the firewall's
RELATED ruleset table allowing the FTP Server to connect to any host and
port protected by the firewalls rules,including the firewall itself.

More information and patch can be found at above URL
Comment 1 Bernhard Rosenkraenzer 2001-04-19 12:41:49 EDT

*** This bug has been marked as a duplicate of 36580 ***

Note You need to log in before you can comment on or make changes to this bug.