CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
AI Score
Confidence
High
EPSS
Percentile
95.0%
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | 2.6.22.4 | cpe:/o:linux:linux_kernel:2.6.22.4::: |
linux | linux_kernel | 2.6.27.3 | cpe:/o:linux:linux_kernel:2.6.27.3::: |
linux | linux_kernel | 2.6.12.1 | cpe:/o:linux:linux_kernel:2.6.12.1::: |
linux | linux_kernel | 2.6.28 | cpe:/o:linux:linux_kernel:2.6.28:rc7:: |
linux | linux_kernel | 2.6.29 | cpe:/o:linux:linux_kernel:2.6.29::: |
linux | linux_kernel | 2.6.11 | cpe:/o:linux:linux_kernel:2.6.11:rc1:: |
linux | linux_kernel | 2.6.27.6 | cpe:/o:linux:linux_kernel:2.6.27.6::: |
linux | linux_kernel | 2.6.15.4 | cpe:/o:linux:linux_kernel:2.6.15.4::: |
linux | linux_kernel | 2.6.21 | cpe:/o:linux:linux_kernel:2.6.21:rc7:: |
linux | linux_kernel | 2.6.14 | cpe:/o:linux:linux_kernel:2.6.14:rc5:: |
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4
lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
lkml.org/lkml/2009/6/8/194
marc.info/?l=linux-netdev&m=123462461713724&w=2
secunia.com/advisories/35265
secunia.com/advisories/35566
secunia.com/advisories/35847
secunia.com/advisories/36045
secunia.com/advisories/36051
secunia.com/advisories/36131
secunia.com/advisories/36327
secunia.com/advisories/37298
secunia.com/advisories/37471
secunia.com/advisories/40645
support.avaya.com/css/P8/documents/100067254
support.citrix.com/article/CTX123453
wiki.rpath.com/Advisories:rPSA-2009-0111
www.debian.org/security/2009/dsa-1844
www.debian.org/security/2009/dsa-1865
www.mandriva.com/security/advisories?name=MDVSA-2009:148
www.openwall.com/lists/oss-security/2009/06/10/1
www.redhat.com/support/errata/RHSA-2009-1157.html
www.redhat.com/support/errata/RHSA-2009-1193.html
www.securityfocus.com/archive/1/505254/100/0/threaded
www.securityfocus.com/archive/1/507985/100/0/threaded
www.securityfocus.com/bid/35281
www.securitytracker.com/id?1023507
www.ubuntu.com/usn/usn-807-1
www.vmware.com/security/advisories/VMSA-2009-0016.html
www.vupen.com/english/advisories/2009/3316
www.vupen.com/english/advisories/2010/0219
www.vupen.com/english/advisories/2010/1857
bugzilla.redhat.com/show_bug.cgi?id=504726
exchange.xforce.ibmcloud.com/vulnerabilities/51051
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108
www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html