Computer Security
[EN] no-pyccku

Linux netfilter multiple security vulnerabilities
SecurityVulns ID:7425
Threat Level:
Description:Protection bypass with fragmented IPv6 packets, denial of service.
Affected:LINUX : kernel 2.6
CVE:CVE-2007-1497 (nf_conntrack in netfilter in the Linux kernel before does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fragments.)
 CVE-2007-1496 (nfnetlink_log in netfilter in the Linux kernel before allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) bridged packets, which trigger a NULL pointer dereference.)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod