Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4387

Опубликовано: 21 сент. 2013
Источник: redhat
CVSS2: 6.1
EPSS Низкий

Описание

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

Отчет

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5. This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2013:164520.11.2013
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:028411.03.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2013:149031.10.2013

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1011927Kernel: net: IPv6: panic when UFO=On for an interface

EPSS

Процентиль: 71%
0.00682
Низкий

6.1 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

nvd
больше 11 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

debian
больше 11 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not prop ...

github
около 3 лет назад

net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

oracle-oval
больше 11 лет назад

ELSA-2013-2583: Unbreakable Enterprise Kernel security update (IMPORTANT)

EPSS

Процентиль: 71%
0.00682
Низкий

6.1 Medium

CVSS2