CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
92.5%
The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:* |
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
linux.bkbits.net:8080/linux-2.6/cset%4042e14e05d0V1d88nZlaIX1F9dCRApA
secunia.com/advisories/17826
secunia.com/advisories/17918
secunia.com/advisories/18056
secunia.com/advisories/18059
secunia.com/advisories/18562
secunia.com/advisories/18684
secunia.com/advisories/18977
secunia.com/advisories/19185
secunia.com/advisories/19607
www.debian.org/security/2005/dsa-921
www.debian.org/security/2005/dsa-922
www.mandriva.com/security/advisories?name=MDKSA-2005:218
www.mandriva.com/security/advisories?name=MDKSA-2005:219
www.mandriva.com/security/advisories?name=MDKSA-2005:220
www.redhat.com/support/errata/RHSA-2006-0140.html
www.redhat.com/support/errata/RHSA-2006-0190.html
www.redhat.com/support/errata/RHSA-2006-0191.html
www.securityfocus.com/archive/1/419522/100/0/threaded
www.securityfocus.com/archive/1/427980/100/0/threaded
www.securityfocus.com/archive/1/428028/100/0/threaded
www.securityfocus.com/archive/1/428058/100/0/threaded
www.securityfocus.com/bid/15531
wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142
usn.ubuntu.com/219-1/