Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-20322

Опубликовано: 26 авг. 2021
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.

Отчет

This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelOut of support scope
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelOut of support scope
Red Hat Enterprise Linux 7kernel-rtOut of support scope
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2022:197510.05.2022
Red Hat Enterprise Linux 8kernelFixedRHSA-2022:198810.05.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportkernel-rtFixedRHSA-2022:483531.05.2022
Red Hat Enterprise Linux 8.4 Extended Update SupportkernelFixedRHSA-2022:482931.05.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-330
https://bugzilla.redhat.com/show_bug.cgi?id=2014230kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies

EPSS

Процентиль: 29%
0.00101
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 3 лет назад

A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.

CVSS3: 7.4
nvd
больше 3 лет назад

A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.

CVSS3: 7.4
debian
больше 3 лет назад

A flaw in the processing of received ICMP errors (ICMP fragment needed ...

suse-cvrf
больше 3 лет назад

Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP3)

suse-cvrf
больше 3 лет назад

Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3)

EPSS

Процентиль: 29%
0.00101
Низкий

7.4 High

CVSS3