Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.150543
Category:Policy
Title:Linux: Get iptables and ip6tables (KB)
Summary:Iptables is used to set up, maintain, and inspect the tables of;IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table;contains a number of built-in chains and may also contain user-defined chains.;;Ip6tables is used to set up, maintain, and inspect the tables of IPv6 packet filter rules in the;Linux kernel. Several different tables may be defined. Each table contains a number of built-in;chains and may also contain user-defined chains.;;Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with;a packet that matches. This is called a 'target', which may be a jump to a user-defined chain in the;same table.;;Note: This script only stores information for other Policy Controls.
Description:Summary:
Iptables is used to set up, maintain, and inspect the tables of
IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table
contains a number of built-in chains and may also contain user-defined chains.

Ip6tables is used to set up, maintain, and inspect the tables of IPv6 packet filter rules in the
Linux kernel. Several different tables may be defined. Each table contains a number of built-in
chains and may also contain user-defined chains.

Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with
a packet that matches. This is called a 'target', which may be a jump to a user-defined chain in the
same table.

Note: This script only stores information for other Policy Controls.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.