Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-6200

Опубликовано: 21 дек. 2023
Источник: redhat
CVSS3: 7.5

Описание

A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.

Отчет

To trigger this issue, the attacker must be on the local network, IPV6, and the parameter net.ipv6.conf must be enabled.[NIC].accept_ra enabled. By default, net.ipv6.conf.[NIC].accept_ra is disabled for Red Hat Enterprise Linux. In the default configuration, only local attacks are possible. The bug was introduced upstream by commit 3dec89b14d37 ("net/ipv6: Remove expired routes with a separated list of routes.").

Меры по смягчению последствий

The remote attack is potentially possible in the local network only. It is not possible if param net.ipv6.conf.[NIC].accept_ra disabled. Check this param value with the command cat /proc/sys/net/ipv6/conf/default/accept_ra or /proc/sys/net/ipv6/conf/eth0/accept_ra (where eth0 is the name of the networking interface). If you cannot run this or a similar command and parameter accept_ra is not available, then IPV6 is disabled. If IPV6 is not being used, it is possible to disable it completely, and there is instruction on how to do this: https://access.redhat.com/solutions/8709

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected
Red Hat Virtualization 4kernelNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=2250377kernel: ICMPv6 Router Advertisement packets, aka Linux TCP/IP Remote Code Execution Vulnerability

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 лет назад

A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.

CVSS3: 7.5
nvd
около 2 лет назад

A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.

CVSS3: 7.5
msrc
около 2 лет назад

Kernel: icmpv6 router advertisement packets aka linux tcp/ip remote code execution vulnerability

CVSS3: 7.5
debian
около 2 лет назад

A race condition was found in the Linux Kernel. Under certain conditio ...

CVSS3: 7.5
github
около 2 лет назад

A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.

7.5 High

CVSS3