Lucene search

K
nvd[email protected]NVD:CVE-2009-1298
HistoryDec 08, 2009 - 11:30 p.m.

CVE-2009-1298

2009-12-0823:30:00
CWE-119
web.nvd.nist.gov
8

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.4

Confidence

Low

EPSS

0.169

Percentile

96.2%

The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.

Affected configurations

Nvd
Node
linuxlinux_kernelRange≀2.6.32rc8
OR
linuxlinux_kernelMatch2.6.28
OR
linuxlinux_kernelMatch2.6.28rc1
OR
linuxlinux_kernelMatch2.6.28rc2
OR
linuxlinux_kernelMatch2.6.28rc3
OR
linuxlinux_kernelMatch2.6.28rc4
OR
linuxlinux_kernelMatch2.6.28rc5
OR
linuxlinux_kernelMatch2.6.28rc6
OR
linuxlinux_kernelMatch2.6.28rc7
OR
linuxlinux_kernelMatch2.6.28.1
OR
linuxlinux_kernelMatch2.6.28.2
OR
linuxlinux_kernelMatch2.6.28.3
OR
linuxlinux_kernelMatch2.6.28.4
OR
linuxlinux_kernelMatch2.6.28.5
OR
linuxlinux_kernelMatch2.6.28.6
OR
linuxlinux_kernelMatch2.6.28.7
OR
linuxlinux_kernelMatch2.6.28.8
OR
linuxlinux_kernelMatch2.6.28.9
OR
linuxlinux_kernelMatch2.6.28.10
OR
linuxlinux_kernelMatch2.6.29
OR
linuxlinux_kernelMatch2.6.29rc2
OR
linuxlinux_kernelMatch2.6.29rc2_git7
OR
linuxlinux_kernelMatch2.6.29rc8-kk
OR
linuxlinux_kernelMatch2.6.29.1
OR
linuxlinux_kernelMatch2.6.29.2
OR
linuxlinux_kernelMatch2.6.29.3
OR
linuxlinux_kernelMatch2.6.29.4
OR
linuxlinux_kernelMatch2.6.29.5
OR
linuxlinux_kernelMatch2.6.29.6
OR
linuxlinux_kernelMatch2.6.30
OR
linuxlinux_kernelMatch2.6.30rc1
OR
linuxlinux_kernelMatch2.6.30rc2
OR
linuxlinux_kernelMatch2.6.30rc3
OR
linuxlinux_kernelMatch2.6.30rc4x86_32
OR
linuxlinux_kernelMatch2.6.30rc5
OR
linuxlinux_kernelMatch2.6.30rc6
OR
linuxlinux_kernelMatch2.6.30rc7-git6
OR
linuxlinux_kernelMatch2.6.30.1
OR
linuxlinux_kernelMatch2.6.30.2
OR
linuxlinux_kernelMatch2.6.30.3
OR
linuxlinux_kernelMatch2.6.30.4
OR
linuxlinux_kernelMatch2.6.30.5
OR
linuxlinux_kernelMatch2.6.30.6
OR
linuxlinux_kernelMatch2.6.30.7
OR
linuxlinux_kernelMatch2.6.30.8
OR
linuxlinux_kernelMatch2.6.30.9
OR
linuxlinux_kernelMatch2.6.31
OR
linuxlinux_kernelMatch2.6.31rc1
OR
linuxlinux_kernelMatch2.6.31rc2
OR
linuxlinux_kernelMatch2.6.31rc3
OR
linuxlinux_kernelMatch2.6.31rc4
OR
linuxlinux_kernelMatch2.6.31rc5
OR
linuxlinux_kernelMatch2.6.31rc6
OR
linuxlinux_kernelMatch2.6.31rc7
OR
linuxlinux_kernelMatch2.6.31rc8
OR
linuxlinux_kernelMatch2.6.31.1
OR
linuxlinux_kernelMatch2.6.31.2
OR
linuxlinux_kernelMatch2.6.31.3
OR
linuxlinux_kernelMatch2.6.31.4
OR
linuxlinux_kernelMatch2.6.31.5
OR
linuxlinux_kernelMatch2.6.31.6
OR
linuxlinux_kernelMatch2.6.32
OR
linuxlinux_kernelMatch2.6.32rc1
OR
linuxlinux_kernelMatch2.6.32rc3
OR
linuxlinux_kernelMatch2.6.32rc4
OR
linuxlinux_kernelMatch2.6.32rc5
OR
linuxlinux_kernelMatch2.6.32rc6
OR
linuxlinux_kernelMatch2.6.32rc7

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.4

Confidence

Low

EPSS

0.169

Percentile

96.2%