First published: Fri Nov 19 2004(Updated: )
Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Suse Suse Iptables | =1.2.11 | |
Linux Linux kernel | =2.4.15 | |
Linux Linux kernel | =2.6.5 | |
Linux Linux kernel | =2.4.11 | |
Linux Linux kernel | =2.6.1 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.26 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.12 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.13 | |
Linux Linux kernel | =2.6.3 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.17 | |
Linux Linux kernel | =2.6.4 | |
Linux Linux kernel | =2.4.21 | |
Linux Linux kernel | =2.4.23 | |
Linux Linux kernel | =2.6.2 | |
Linux Linux kernel | =2.4.7 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.25 | |
Linux Linux kernel | =2.6.8 | |
Linux Linux kernel | =2.4.24 | |
Linux Linux kernel | =2.4.9 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.6.0 | |
Linux Linux kernel | =2.4.10 | |
Linux Linux kernel | =2.4.0 | |
Linux Linux kernel | =2.4.2 | |
Linux Linux kernel | =2.4.16 | |
Linux Linux kernel | =2.4.8 | |
Linux Linux kernel | =2.0.2 | |
Linux Linux kernel | =2.4.19 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.14 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.22 | |
Linux Linux kernel | =2.4.5 | |
Linux Linux kernel | =2.6.7 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.4.18 | |
Linux Linux kernel | =2.6.9-2.6.20 | |
Linux Linux kernel | =2.4.3 | |
Linux Linux kernel | =2.4.1 | |
Linux Linux kernel | =2.4.4 | |
Redhat Fedora Core | =core_3.0 | |
Linux Linux kernel | =2.4.6 | |
Linux Linux kernel | =2.4.20 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Linux Linux kernel | =2.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.