A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.
References
Link | Resource |
---|---|
https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/ | Exploit Patch Third Party Advisory |
https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f06de305ca13a842ac83d4683e | Patch Third Party Advisory URL Repurposed |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-12T13:54:45
Updated: 2019-07-12T13:54:45
Reserved: 2019-04-19T00:00:00
Link: CVE-2019-11360
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-12T14:15:11.733
Modified: 2024-02-14T01:17:43.863
Link: CVE-2019-11360
JSON object: View
Redhat Information
No data.
CWE