Vulnerability Name: | CVE-2001-0405 (CCN-6390) | ||||||||
Assigned: | 2001-04-16 | ||||||||
Published: | 2001-04-16 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: Exploit, Patch, Vendor Advisory 20010416 Tempest Security Techonologies -- Adivsory #01/2001 -- Linux IPTables Source: MITRE Type: CNA CVE-2001-0405 Source: CCN Type: Netfilter Security Announcement Web site Important Security announcement! Source: CCN Type: RHSA-2001-084 Kernel: FTP iptables vulnerability in 2.4 kernel and general bug fixes Source: MANDRAKE Type: UNKNOWN MDKSA-2001:071 Source: CCN Type: OSVDB ID: 1790 IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion Source: REDHAT Type: Vendor Advisory RHSA-2001:052 Source: REDHAT Type: UNKNOWN RHSA-2001:084 Source: BID Type: Exploit, Patch, Vendor Advisory 2602 Source: CCN Type: BID-2602 IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion Vulnerability Source: CCN Type: Tempest Security Techonologies -- Advisory #01/2001 Linux IPTables Source: XF Type: UNKNOWN linux-netfilter-iptables(6390) Source: XF Type: UNKNOWN linux-netfilter-iptables(6390) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |