Π›ΠΎΠ³ΠΎΡ‚ΠΈΠΏ exploitDog
Консоль
Π›ΠΎΠ³ΠΎΡ‚ΠΈΠΏ exploitDog

exploitDog

redhat Π»ΠΎΠ³ΠΎΡ‚ΠΈΠΏ

CVE-2007-4567

ΠžΠΏΡƒΠ±Π»ΠΈΠΊΠΎΠ²Π°Π½ΠΎ: 07 сСнт. 2007
Π˜ΡΡ‚ΠΎΡ‡Π½ΠΈΠΊ: redhat
CVSS2: 7.8
EPSS Низкий

ОписаниС

The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.

ΠžΡ‚Ρ‡Π΅Ρ‚

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem. This upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.

Бсылки Π½Π° источники

Π”ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½Π°Ρ информация

Бтатус:

Important
Π”Π΅Ρ„Π΅ΠΊΡ‚:
CWE-228->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=548641kernel: ipv6_hop_jumbo remote system crash

EPSS

ΠŸΡ€ΠΎΡ†Π΅Π½Ρ‚ΠΈΠ»ΡŒ: 89%
0.05055
Низкий

7.8 High

CVSS2

БвязанныС уязвимости

ubuntu
ΠΏΠΎΡ‡Ρ‚ΠΈ 18 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.

nvd
ΠΏΠΎΡ‡Ρ‚ΠΈ 18 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.

debian
ΠΏΠΎΡ‡Ρ‚ΠΈ 18 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel ...

github
большС 3 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.

oracle-oval
большС 15 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

ELSA-2010-0019: kernel security update (IMPORTANT)

EPSS

ΠŸΡ€ΠΎΡ†Π΅Π½Ρ‚ΠΈΠ»ΡŒ: 89%
0.05055
Низкий

7.8 High

CVSS2

Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡ‚ΡŒ CVE-2007-4567