UBUNTU-CVE-2012-2663

Source
https://ubuntu.com/security/CVE-2012-2663
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-2663.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2012-2663
Related
Published
2014-02-15T14:57:00Z
Modified
2025-01-13T10:21:01Z
Summary
[none]
Details

extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.

References

Affected packages

Ubuntu:Pro:14.04:LTS / iptables

Package

Name
iptables
Purl
pkg:deb/ubuntu/iptables@1.4.21-1ubuntu1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.4.18-1.1ubuntu1
1.4.20-2
1.4.20-2ubuntu1
1.4.21-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:Pro:16.04:LTS / iptables

Package

Name
iptables
Purl
pkg:deb/ubuntu/iptables@1.6.0-2ubuntu3?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.4.21-2ubuntu2
1.6.0-2ubuntu3

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:Pro:18.04:LTS / iptables

Package

Name
iptables
Purl
pkg:deb/ubuntu/iptables@1.6.1-2ubuntu2.1?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6.1-2ubuntu1
1.6.1-2ubuntu2
1.6.1-2ubuntu2.1

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:20.04:LTS / iptables

Package

Name
iptables
Purl
pkg:deb/ubuntu/iptables@1.8.4-3ubuntu2.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.3-2ubuntu5
1.8.4-3ubuntu1
1.8.4-3ubuntu2
1.8.4-3ubuntu2.1

Ecosystem specific

{
    "ubuntu_priority": "low"
}