Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3809

Опубликовано: 25 нояб. 2005
Источник: debian
EPSS Низкий

Описание

The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.14-4package
kernel-source-2.4.27not-affectedsargepackage
kernel-source-2.6.8not-affectedsargepackage

EPSS

Процентиль: 65%
0.00492
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.

nvd
почти 20 лет назад

The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.

github
больше 3 лет назад

The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.

EPSS

Процентиль: 65%
0.00492
Низкий