6.3 Medium
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.062 Low
EPSS
Percentile
93.5%
ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka “ip6_tables protocol bypass bug;” and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka “ip6_tables extension header bypass bug.”
readlist.com/lists/vger.kernel.org/linux-kernel/55/275979.html
secunia.com/advisories/22731
secunia.com/advisories/22762
secunia.com/advisories/23384
secunia.com/advisories/23474
secunia.com/advisories/24098
secunia.com/advisories/25691
www.kernel.org/git/?p=linux%2Fkernel%2Fgit%2Fstable%2Flinux-2.6.16.y.git&a=search&s=CVE-2006-4572
www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=0ddfcc96928145d6a6425fdd26dad6abfe7f891d
www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=6ac62be885810e1f8390f0c3b9d3ee451d3d3f19
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.31
www.mandriva.com/security/advisories?name=MDKSA-2006:197
www.novell.com/linux/security/advisories/2006_79_kernel.html
www.securityfocus.com/archive/1/471457
www.securityfocus.com/bid/20955
www.ubuntu.com/usn/usn-395-1
www.ubuntu.com/usn/usn-416-1
www.vupen.com/english/advisories/2006/4386
More