Computer Security
[EN] securityvulns.ru no-pyccku


Linux netfilter multiple security vulnerabilities
Published:18.03.2007
Source:
SecurityVulns ID:7425
Type:remote
Threat Level:
6/10
Description:Protection bypass with fragmented IPv6 packets, denial of service.
Affected:LINUX : kernel 2.6
CVE:CVE-2007-1497 (nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fragments.)
 CVE-2007-1496 (nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) bridged packets, which trigger a NULL pointer dereference.)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod