First published: Wed Jan 14 2015(Updated: )
It was reported [1] that iptables can allow protocols that do not have a protocol handler kernel module loaded. Given following iptables ruleset: -P FORWARD DROP -A FORWARD -m sctp --dport 9 -j ACCEPT -A FORWARD -p tcp --dport 80 -j ACCEPT -A FORWARD -p tcp -m conntrack -m state ESTABLISHED,RELATED -j ACCEPT One would assume that this allows SCTP on port 9 and TCP on port 80. Unfortunately, if the SCTP conntrack module is not loaded, this allows *all* SCTP communication to pass through, i.e. -p sctp -j ACCEPT [1]: <a href="http://www.spinics.net/lists/netfilter-devel/msg33430.html">http://www.spinics.net/lists/netfilter-devel/msg33430.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE iptables |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.