Lucene search

K
cve[email protected]CVE-2006-4572
HistoryNov 07, 2006 - 12:07 a.m.

CVE-2006-4572

2006-11-0700:07:00
CWE-264
web.nvd.nist.gov
28
8
cve-2006-4572
linux kernel
netfilter
ip6_tables
remote attackers
protocol bypass
extension header bypass

6.3 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.062 Low

EPSS

Percentile

93.5%

ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka “ip6_tables protocol bypass bug;” and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka “ip6_tables extension header bypass bug.”

References

Social References

More

6.3 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.062 Low

EPSS

Percentile

93.5%

Related for CVE-2006-4572