Lucene search

K
nvd[email protected]NVD:CVE-2007-1388
HistoryMar 10, 2007 - 7:19 p.m.

CVE-2007-1388

2007-03-1019:19:00
CWE-399
web.nvd.nist.gov

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:N/I:N/A:C

6.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%

The do_ipv6_setsockopt function in net/ipv6/ipv6_sockglue.c in Linux kernel before 2.6.20, and possibly other versions, allows local users to cause a denial of service (oops) by calling setsockopt with the IPV6_RTHDR option name and possibly a zero option length or invalid option value, which triggers a NULL pointer dereference.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.6.19.7
OR
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11.1
OR
linuxlinux_kernelMatch2.6.11.2
OR
linuxlinux_kernelMatch2.6.11.3
OR
linuxlinux_kernelMatch2.6.11.4
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11.9
OR
linuxlinux_kernelMatch2.6.11.10
OR
linuxlinux_kernelMatch2.6.11.11
OR
linuxlinux_kernelMatch2.6.11.12
OR
linuxlinux_kernelMatch2.6.12
OR
linuxlinux_kernelMatch2.6.12.1
OR
linuxlinux_kernelMatch2.6.12.2
OR
linuxlinux_kernelMatch2.6.12.3
OR
linuxlinux_kernelMatch2.6.12.4
OR
linuxlinux_kernelMatch2.6.12.5
OR
linuxlinux_kernelMatch2.6.12.6
OR
linuxlinux_kernelMatch2.6.13
OR
linuxlinux_kernelMatch2.6.13.1
OR
linuxlinux_kernelMatch2.6.13.2
OR
linuxlinux_kernelMatch2.6.13.3
OR
linuxlinux_kernelMatch2.6.13.4
OR
linuxlinux_kernelMatch2.6.13.5
OR
linuxlinux_kernelMatch2.6.14
OR
linuxlinux_kernelMatch2.6.14.1
OR
linuxlinux_kernelMatch2.6.14.2
OR
linuxlinux_kernelMatch2.6.14.3
OR
linuxlinux_kernelMatch2.6.14.4
OR
linuxlinux_kernelMatch2.6.14.5
OR
linuxlinux_kernelMatch2.6.14.6
OR
linuxlinux_kernelMatch2.6.14.7
OR
linuxlinux_kernelMatch2.6.15
OR
linuxlinux_kernelMatch2.6.15.1
OR
linuxlinux_kernelMatch2.6.15.2
OR
linuxlinux_kernelMatch2.6.15.3
OR
linuxlinux_kernelMatch2.6.15.4
OR
linuxlinux_kernelMatch2.6.15.5
OR
linuxlinux_kernelMatch2.6.15.6
OR
linuxlinux_kernelMatch2.6.15.7
OR
linuxlinux_kernelMatch2.6.16
OR
linuxlinux_kernelMatch2.6.16.1
OR
linuxlinux_kernelMatch2.6.16.2
OR
linuxlinux_kernelMatch2.6.16.3
OR
linuxlinux_kernelMatch2.6.16.4
OR
linuxlinux_kernelMatch2.6.16.5
OR
linuxlinux_kernelMatch2.6.16.6
OR
linuxlinux_kernelMatch2.6.16.7
OR
linuxlinux_kernelMatch2.6.16.8
OR
linuxlinux_kernelMatch2.6.16.9
OR
linuxlinux_kernelMatch2.6.16.10
OR
linuxlinux_kernelMatch2.6.16.11
OR
linuxlinux_kernelMatch2.6.16.12
OR
linuxlinux_kernelMatch2.6.16.13
OR
linuxlinux_kernelMatch2.6.16.14
OR
linuxlinux_kernelMatch2.6.16.15
OR
linuxlinux_kernelMatch2.6.16.16
OR
linuxlinux_kernelMatch2.6.16.17
OR
linuxlinux_kernelMatch2.6.16.18
OR
linuxlinux_kernelMatch2.6.16.19
OR
linuxlinux_kernelMatch2.6.16.20
OR
linuxlinux_kernelMatch2.6.16.21
OR
linuxlinux_kernelMatch2.6.16.22
OR
linuxlinux_kernelMatch2.6.16.23
OR
linuxlinux_kernelMatch2.6.16.24
OR
linuxlinux_kernelMatch2.6.16.25
OR
linuxlinux_kernelMatch2.6.16.26
OR
linuxlinux_kernelMatch2.6.16.27
OR
linuxlinux_kernelMatch2.6.16.28
OR
linuxlinux_kernelMatch2.6.16.29
OR
linuxlinux_kernelMatch2.6.16.30
OR
linuxlinux_kernelMatch2.6.16.31
OR
linuxlinux_kernelMatch2.6.16.32
OR
linuxlinux_kernelMatch2.6.16.33
OR
linuxlinux_kernelMatch2.6.16.34
OR
linuxlinux_kernelMatch2.6.16.35
OR
linuxlinux_kernelMatch2.6.16.36
OR
linuxlinux_kernelMatch2.6.16.37
OR
linuxlinux_kernelMatch2.6.16.38
OR
linuxlinux_kernelMatch2.6.16.39
OR
linuxlinux_kernelMatch2.6.16.40
OR
linuxlinux_kernelMatch2.6.16.41
OR
linuxlinux_kernelMatch2.6.16.42
OR
linuxlinux_kernelMatch2.6.16.43
OR
linuxlinux_kernelMatch2.6.16.44
OR
linuxlinux_kernelMatch2.6.16.45
OR
linuxlinux_kernelMatch2.6.16.46
OR
linuxlinux_kernelMatch2.6.16.47
OR
linuxlinux_kernelMatch2.6.16.48
OR
linuxlinux_kernelMatch2.6.16.49
OR
linuxlinux_kernelMatch2.6.16.50
OR
linuxlinux_kernelMatch2.6.16.51
OR
linuxlinux_kernelMatch2.6.16.52
OR
linuxlinux_kernelMatch2.6.16.53
OR
linuxlinux_kernelMatch2.6.16.54
OR
linuxlinux_kernelMatch2.6.16.55
OR
linuxlinux_kernelMatch2.6.16.56
OR
linuxlinux_kernelMatch2.6.16.57
OR
linuxlinux_kernelMatch2.6.16.58
OR
linuxlinux_kernelMatch2.6.16.59
OR
linuxlinux_kernelMatch2.6.16.60
OR
linuxlinux_kernelMatch2.6.16.61
OR
linuxlinux_kernelMatch2.6.16.62
OR
linuxlinux_kernelMatch2.6.17
OR
linuxlinux_kernelMatch2.6.17.1
OR
linuxlinux_kernelMatch2.6.17.2
OR
linuxlinux_kernelMatch2.6.17.3
OR
linuxlinux_kernelMatch2.6.17.4
OR
linuxlinux_kernelMatch2.6.17.5
OR
linuxlinux_kernelMatch2.6.17.6
OR
linuxlinux_kernelMatch2.6.17.7
OR
linuxlinux_kernelMatch2.6.17.8
OR
linuxlinux_kernelMatch2.6.17.9
OR
linuxlinux_kernelMatch2.6.17.10
OR
linuxlinux_kernelMatch2.6.17.11
OR
linuxlinux_kernelMatch2.6.17.12
OR
linuxlinux_kernelMatch2.6.17.13
OR
linuxlinux_kernelMatch2.6.17.14
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18.1
OR
linuxlinux_kernelMatch2.6.18.2
OR
linuxlinux_kernelMatch2.6.18.3
OR
linuxlinux_kernelMatch2.6.18.4
OR
linuxlinux_kernelMatch2.6.18.5
OR
linuxlinux_kernelMatch2.6.18.6
OR
linuxlinux_kernelMatch2.6.18.7
OR
linuxlinux_kernelMatch2.6.18.8
OR
linuxlinux_kernelMatch2.6.19
OR
linuxlinux_kernelMatch2.6.19.1
OR
linuxlinux_kernelMatch2.6.19.2
OR
linuxlinux_kernelMatch2.6.19.3
OR
linuxlinux_kernelMatch2.6.19.4
OR
linuxlinux_kernelMatch2.6.19.5
OR
linuxlinux_kernelMatch2.6.19.6

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:N/I:N/A:C

6.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%