First published: Fri Nov 19 2004(Updated: )
Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE iptables | =1.2.11 | |
Linux Kernel | =2.4.15 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.4.11 | |
Linux Kernel | =2.6.1 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.26 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.12 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.13 | |
Linux Kernel | =2.6.3 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.17 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.4.21 | |
Linux Kernel | =2.4.23 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.4.7 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.25 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.4.24 | |
Linux Kernel | =2.4.9 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.4.10 | |
Linux Kernel | =2.4.0 | |
Linux Kernel | =2.4.2 | |
Linux Kernel | =2.4.16 | |
Linux Kernel | =2.4.8 | |
Linux Kernel | =2.0.2 | |
Linux Kernel | =2.4.19 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.14 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.22 | |
Linux Kernel | =2.4.5 | |
Linux Kernel | =2.6.7 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.4.18 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.4.3 | |
Linux Kernel | =2.4.1 | |
Linux Kernel | =2.4.4 | |
Red Hat Fedora Core | =core_3.0 | |
Linux Kernel | =2.4.6 | |
Linux Kernel | =2.4.20 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Linux Kernel | =2.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0986 has a medium severity due to potential security risk of firewall rules failing to load.
To fix CVE-2004-0986, you should upgrade iptables to version 1.2.11 or later.
CVE-2004-0986 affects versions of iptables prior to 1.2.11 on various Linux distributions including Debian and SUSE.
The consequences of CVE-2004-0986 include potential exposure to remote attacks due to ineffective firewall protection.
A temporary workaround for CVE-2004-0986 is manually loading required modules before starting the firewall, but upgrading is the recommended approach.