The Network Address Translation (NAT) capability for Netfilter ("iptables") 1.2.6a and earlier leaks translated IP addresses in ICMP error messages.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:39
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://marc.info/?l=bugtraq&m=102088521517722&w=2 - Mailing List | |
| References | () http://online.securityfocus.com/advisories/4116 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.iss.net/security_center/static/9043.php - Broken Link, Patch, Vendor Advisory | |
| References | () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-030.php - Broken Link | |
| References | () http://www.redhat.com/support/errata/RHSA-2002-086.html - Broken Link, Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/4699 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | 
03 Feb 2024, 02:31
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 5.0 v3 : 7.5 | 
| CWE | CWE-212 | |
| References | (HP) http://online.securityfocus.com/advisories/4116 - Broken Link, Third Party Advisory, VDB Entry | |
| References | (MANDRAKE) http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-030.php - Broken Link | |
| References | (BID) http://www.securityfocus.com/bid/4699 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
| References | (XF) http://www.iss.net/security_center/static/9043.php - Broken Link, Patch, Vendor Advisory | |
| References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=102088521517722&w=2 - Mailing List | |
| References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2002-086.html - Broken Link, Patch, Vendor Advisory | |
| CPE | cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:* | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 
Information
                Published : 2002-07-26 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-0704
Mitre link : CVE-2002-0704
CVE.ORG link : CVE-2002-0704
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                
                    
                        
                        CWE-212
                        
            Improper Removal of Sensitive Information Before Storage or Transfer
