Vulnerability Description
A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netfilter | Iptables | 1.8.2 |
Related Weaknesses (CWE)
References
- https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/ExploitPatchThird Party Advisory
- https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f0PatchThird Party AdvisoryURL Repurposed
- https://0day.work/cve-2019-11360-bufferoverflow-in-iptables-restore-v1-8-2/ExploitPatchThird Party Advisory
- https://git.netfilter.org/iptables/commit/iptables/xshared.c?id=2ae1099a42e6a0f0PatchThird Party AdvisoryURL Repurposed
FAQ
What is CVE-2019-11360?
CVE-2019-11360 is a vulnerability with a CVSS score of 4.2 (MEDIUM). A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This...
How severe is CVE-2019-11360?
CVE-2019-11360 has been rated MEDIUM with a CVSS base score of 4.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11360?
Check the references section above for vendor advisories and patch information. Affected products include: Netfilter Iptables.