SB2019071105 - Buffer overflow in iptables



SB2019071105 - Buffer overflow in iptables

Published: July 11, 2019 Updated: July 11, 2019

Security Bulletin ID SB2019071105
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Buffer overflow (CVE-ID: CVE-2019-11360)

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in add_param_to_argv() function in iptables/xshared.c when parsing, passed as argument to iptables-restore. A remote attacker can create a specially crafted files with iptables rules, trick a system administrator to pass it to the iptables-restore tool, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires significant social engineering.


Remediation

Install update from vendor's website.