Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1188

Опубликовано: 23 янв. 2007
Источник: redhat
CVSS2: 7.8
EPSS Низкий

Описание

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

Отчет

This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.

Дополнительная информация

Статус:

Important
Дефект:
CWE-672->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=577711kernel: ipv6: skb is unexpectedly freed

EPSS

Процентиль: 85%
0.02726
Низкий

7.8 High

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

nvd
больше 15 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

debian
больше 15 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kern ...

github
больше 3 лет назад

Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.

oracle-oval
больше 15 лет назад

ELSA-2010-0178: Oracle Enterprise Linux 5.5 kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 85%
0.02726
Низкий

7.8 High

CVSS2