Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1770

Опубликовано: 24 июн. 2011
Источник: debian

Описание

Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.39-1package
linux-2.6fixed2.6.32-34squeeze1squeezepackage
linux-2.6not-affectedlennypackage

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 14 лет назад

Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.

redhat
около 14 лет назад

Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.

CVSS3: 7.5
nvd
почти 14 лет назад

Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.

CVSS3: 7.5
github
около 3 лет назад

Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.

oracle-oval
около 14 лет назад

ELSA-2011-2019: Oracle Linux 6 Unbreakable Enterprise kernel security fix update (IMPORTANT)