Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4387

Опубликовано: 10 окт. 2013
Источник: debian
EPSS Низкий

Описание

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6removedpackage
linux-2.6fixed2.6.32-48squeeze8squeezepackage
linuxfixed3.11.5-1package
linuxfixed3.2.53-1wheezypackage

EPSS

Процентиль: 71%
0.00682
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

redhat
больше 11 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

nvd
больше 11 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

github
около 3 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

oracle-oval
больше 11 лет назад

ELSA-2013-2583: Unbreakable Enterprise Kernel security update (IMPORTANT)

EPSS

Процентиль: 71%
0.00682
Низкий