[Bug 643] New: Inconsistent target length requirements for chain names and jump/goto targets
bugzilla-daemon at bugzilla.netfilter.org
bugzilla-daemon at bugzilla.netfilter.org
Wed Mar 31 10:11:57 CEST 2010
http://bugzilla.netfilter.org/show_bug.cgi?id=643
Summary: Inconsistent target length requirements for chain names
and jump/goto targets
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P1
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy: aldem-iptbugs at aldem.net
According to documentation, maximum chain name length should be below 30
characters.
However, while "iptables -N" and iptables-restore allows creation of chains
with name length 29, jump or goto targets only accept 27 characters.
What is worse, providing target name of length more than 27 characters to
jump/goto targets (target chain must exists) causes buffer overflow when
invoking iptables-restore or iptables -j.
This was tested on most recent (production) version of iptables distributed
with Fedora 12 (1.4.5).
To reproduce, perform:
iptables -N 012345678901234567890123456789
iptables -A FORWARD -j 0123456789001234567890123456789 # Buffer overflow
iptables -A FORWARD -j 012345678900123456789012345678 # Buffer overflow
iptables -A FORWARD -j 01234567890012345678901234567 # OK
--
Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the netfilter-buglog
mailing list