Vulnerabilities > CVE-2001-0405 - Unspecified vulnerability in Linux Kernel
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 5 |
Exploit-Db
description | Linux kernel 2.4 IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion. CVE-2001-0405. Remote exploit for linux platform |
id | EDB-ID:20765 |
last seen | 2016-02-02 |
modified | 2001-04-16 |
published | 2001-04-16 |
reporter | Cristiano Lincoln Mattos |
source | https://www.exploit-db.com/download/20765/ |
title | Linux kernel 2.4 IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion |
Nessus
NASL family | Mandriva Local Security Checks |
NASL id | MANDRAKE_MDKSA-2001-071.NASL |
description | A security hole was found in the earlier Linux 2.4 kernels dealing with iptables RELATED connection tracking. The iptables ip_conntrack_ftp module, which is used for stateful inspection of FTP traffic, does not validate parameters passed to it in an FTP PORT command. Due to this flaw, carefully constructed PORT commands could open arbitrary holes in the firewall. This hole has been fixed, as well as a number of other bugs for the 2.4 kernel shipped with Mandrake Linux 8.0 NOTE: This update is *not* meant to be done via MandrakeUpdate! You must download the necessary RPMs and upgrade manually by following these steps : 1. Type: rpm -ivh kernel-2.4.7-12.3mdk.i586.rpm 2. Type: mv kernel-2.4.7-12.3mdk.i586.rpm /tmp 3. Type: rpm -Fvh *.rpm 4. You may wish to edit /etc/lilo.conf to ensure a new entry is in place. The new kernel will be the last entry. Change any options you need to change. 5. Type: /sbin/lilo -v You may then reboot and use the nwe kernel and remove the older kernel when you are comfortable using the upgraded one. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 13886 |
published | 2004-07-31 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/13886 |
title | Mandrake Linux Security Advisory : kernel (MDKSA-2001:071) |
Redhat
advisories |
|
References
- http://archives.neohapsis.com/archives/bugtraq/2001-04/0271.html
- http://www.redhat.com/support/errata/RHSA-2001-052.html
- http://www.securityfocus.com/bid/2602
- http://www.redhat.com/support/errata/RHSA-2001-084.html
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-071.php3
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6390