Vulnerabilities > CVE-2001-0405 - Unspecified vulnerability in Linux Kernel

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
linux
nessus
exploit available

Summary

ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall.

Exploit-Db

descriptionLinux kernel 2.4 IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion. CVE-2001-0405. Remote exploit for linux platform
idEDB-ID:20765
last seen2016-02-02
modified2001-04-16
published2001-04-16
reporterCristiano Lincoln Mattos
sourcehttps://www.exploit-db.com/download/20765/
titleLinux kernel 2.4 IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion

Nessus

NASL familyMandriva Local Security Checks
NASL idMANDRAKE_MDKSA-2001-071.NASL
descriptionA security hole was found in the earlier Linux 2.4 kernels dealing with iptables RELATED connection tracking. The iptables ip_conntrack_ftp module, which is used for stateful inspection of FTP traffic, does not validate parameters passed to it in an FTP PORT command. Due to this flaw, carefully constructed PORT commands could open arbitrary holes in the firewall. This hole has been fixed, as well as a number of other bugs for the 2.4 kernel shipped with Mandrake Linux 8.0 NOTE: This update is *not* meant to be done via MandrakeUpdate! You must download the necessary RPMs and upgrade manually by following these steps : 1. Type: rpm -ivh kernel-2.4.7-12.3mdk.i586.rpm 2. Type: mv kernel-2.4.7-12.3mdk.i586.rpm /tmp 3. Type: rpm -Fvh *.rpm 4. You may wish to edit /etc/lilo.conf to ensure a new entry is in place. The new kernel will be the last entry. Change any options you need to change. 5. Type: /sbin/lilo -v You may then reboot and use the nwe kernel and remove the older kernel when you are comfortable using the upgraded one.
last seen2020-06-01
modified2020-06-02
plugin id13886
published2004-07-31
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/13886
titleMandrake Linux Security Advisory : kernel (MDKSA-2001:071)

Redhat

advisories
  • rhsa
    idRHSA-2001:052
  • rhsa
    idRHSA-2001:084