CVE-2005-3848

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."

References

http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html

http://marc.info/?l=linux-kernel&m=112431016816937&w=2

http://marc.info/?l=linux-kernel&m=112439084918917&w=2

http://marc.info/?l=linux-kernel&m=112508479212728&w=2

http://secunia.com/advisories/18203

http://secunia.com/advisories/18510

http://secunia.com/advisories/18562

http://secunia.com/advisories/19038

http://secunia.com/advisories/19369

http://secunia.com/advisories/19374

http://www.debian.org/security/2006/dsa-1017

http://www.debian.org/security/2006/dsa-1018

http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git;a=blob;h=1cf41a8a8db3080c9a9243e77c5c447c8e694f87;hb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd;f=2.6.12.6/fix-dst-leak-in-icmp_push_reply.patch

http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=cb94c62c252796f42bb83fe40960d12f3ea5a82a

http://www.mandriva.com/security/advisories?name=MDKSA-2006:072

http://www.redhat.com/support/errata/RHSA-2006-0101.html

http://www.redhat.com/support/errata/RHSA-2006-0140.html

http://www.securityfocus.com/bid/16044

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11346

https://usn.ubuntu.com/231-1/

Details

Source: MITRE

Published: 2005-11-27

Updated: 2018-10-03

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*

Tenable Plugins

View all (9 total)

IDNameProductFamilySeverity
22560Debian DSA-1018-2 : kernel-source-2.4.27 - several vulnerabilitiesNessusDebian Local Security Checks
high
22559Debian DSA-1017-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
critical
21977CentOS 4 : kernel (CESA-2006:0101)NessusCentOS Local Security Checks
high
21881CentOS 3 : kernel (CESA-2006:0140)NessusCentOS Local Security Checks
high
20775Ubuntu 4.10 / 5.04 / 5.10 : linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities (USN-231-1)NessusUbuntu Local Security Checks
high
20751RHEL 3 : kernel (RHSA-2006:0140)NessusRed Hat Local Security Checks
high
20732RHEL 4 : kernel (RHSA-2006:0101)NessusRed Hat Local Security Checks
high
801415CentOS RHSA-2006-0140 Security CheckLog Correlation EngineGeneric
high
801413CentOS RHSA-2006-0101 Security CheckLog Correlation EngineGeneric
high