Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-4536

Опубликовано: 12 янв. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.8

Описание

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

2.6.24-27.65
intrepid

released

2.6.27-17.45
jaunty

released

2.6.28-18.59
karmic

released

2.6.31-19.56
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-55.82
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 81%
0.01586
Низкий

7.8 High

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.

nvd
больше 15 лет назад

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.

debian
больше 15 лет назад

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel ...

github
около 3 лет назад

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.

oracle-oval
больше 15 лет назад

ELSA-2010-0019: kernel security update (IMPORTANT)

EPSS

Процентиль: 81%
0.01586
Низкий

7.8 High

CVSS2