Lucene search

K
nvd[email protected]NVD:CVE-2007-5501
HistoryNov 15, 2007 - 8:46 p.m.

CVE-2007-5501

2007-11-1520:46:00
CWE-399
web.nvd.nist.gov

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

6.2 Medium

AI Score

Confidence

Low

0.073 Low

EPSS

Percentile

94.1%

The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.21
OR
linuxlinux_kernelMatch2.6.21rc1
OR
linuxlinux_kernelMatch2.6.21rc2
OR
linuxlinux_kernelMatch2.6.21rc3
OR
linuxlinux_kernelMatch2.6.21rc4
OR
linuxlinux_kernelMatch2.6.21rc5
OR
linuxlinux_kernelMatch2.6.21rc6
OR
linuxlinux_kernelMatch2.6.21rc7
OR
linuxlinux_kernelMatch2.6.21.1
OR
linuxlinux_kernelMatch2.6.21.2
OR
linuxlinux_kernelMatch2.6.21.3
OR
linuxlinux_kernelMatch2.6.21.4
OR
linuxlinux_kernelMatch2.6.21.5
OR
linuxlinux_kernelMatch2.6.21.6
OR
linuxlinux_kernelMatch2.6.21.7
OR
linuxlinux_kernelMatch2.6.22
OR
linuxlinux_kernelMatch2.6.22rc1
OR
linuxlinux_kernelMatch2.6.22rc2
OR
linuxlinux_kernelMatch2.6.22rc3
OR
linuxlinux_kernelMatch2.6.22rc4
OR
linuxlinux_kernelMatch2.6.22rc5
OR
linuxlinux_kernelMatch2.6.22rc6
OR
linuxlinux_kernelMatch2.6.22rc7
OR
linuxlinux_kernelMatch2.6.22.1
OR
linuxlinux_kernelMatch2.6.22.2
OR
linuxlinux_kernelMatch2.6.22.3
OR
linuxlinux_kernelMatch2.6.22.4
OR
linuxlinux_kernelMatch2.6.22.5
OR
linuxlinux_kernelMatch2.6.22.6
OR
linuxlinux_kernelMatch2.6.22.7
OR
linuxlinux_kernelMatch2.6.22.8
OR
linuxlinux_kernelMatch2.6.22.9
OR
linuxlinux_kernelMatch2.6.22.10
OR
linuxlinux_kernelMatch2.6.22.11
OR
linuxlinux_kernelMatch2.6.22.12
OR
linuxlinux_kernelMatch2.6.22.13
OR
linuxlinux_kernelMatch2.6.22.14
OR
linuxlinux_kernelMatch2.6.22.15
OR
linuxlinux_kernelMatch2.6.22.16
OR
linuxlinux_kernelMatch2.6.22.17
OR
linuxlinux_kernelMatch2.6.22.18
OR
linuxlinux_kernelMatch2.6.22.19
OR
linuxlinux_kernelMatch2.6.22.20
OR
linuxlinux_kernelMatch2.6.22.21
OR
linuxlinux_kernelMatch2.6.22.22
OR
linuxlinux_kernelMatch2.6.23
OR
linuxlinux_kernelMatch2.6.23rc1
OR
linuxlinux_kernelMatch2.6.23rc2
OR
linuxlinux_kernelMatch2.6.23rc3
OR
linuxlinux_kernelMatch2.6.23rc4
OR
linuxlinux_kernelMatch2.6.23rc5
OR
linuxlinux_kernelMatch2.6.23rc6
OR
linuxlinux_kernelMatch2.6.23rc7
OR
linuxlinux_kernelMatch2.6.23rc8
OR
linuxlinux_kernelMatch2.6.23rc9
OR
linuxlinux_kernelMatch2.6.23.1
OR
linuxlinux_kernelMatch2.6.23.2
OR
linuxlinux_kernelMatch2.6.23.3
OR
linuxlinux_kernelMatch2.6.23.4
OR
linuxlinux_kernelMatch2.6.23.5
OR
linuxlinux_kernelMatch2.6.23.6
OR
linuxlinux_kernelMatch2.6.23.7
OR
linuxlinux_kernelMatch2.6.24rc1
OR
linuxlinux_kernelMatch2.6.24rc2

References

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

6.2 Medium

AI Score

Confidence

Low

0.073 Low

EPSS

Percentile

94.1%