Computer Security
[EN] securityvulns.ru no-pyccku


Linux setsockopt / getsockopt IPv6 DoS
Published:12.03.2007
Source:
SecurityVulns ID:7389
Type:local
Threat Level:
5/10
Description:IPV6_RTHDR option with invalid value causes system crash.
Affected:LINUX : kernel 2.6
CVE:CVE-2007-1388 (The do_ipv6_setsockopt function in net/ipv6/ipv6_sockglue.c in Linux kernel before 2.6.20, and possibly other versions, allows local users to cause a denial of service (oops) by calling setsockopt with the IPV6_RTHDR option name and possibly a zero option length or invalid option value, which triggers a NULL pointer dereference.)
 CVE-2007-1000 (The ipv6_getsockopt_sticky function in net/ipv6/ipv6_sockglue.c in the Linux kernel before 2.6.20.2 allows local users to read arbitrary kernel memory via certain getsockopt calls that trigger a NULL dereference.)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod