Linux Kernel Netfilter SNMP NAT Memory Bug Lets Remote Users Deny Service
|
SecurityTracker Alert ID: 1016153 |
SecurityTracker URL: http://securitytracker.com/id/1016153
|
CVE Reference:
CVE-2006-2444
(Links to External Site)
|
Date: May 24 2006
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 2.6.x
|
Description:
A vulnerability was reported in Linux Kernel in the Netfilter code. A remote user can cause denial of service conditions.
If the Netfilter ip_nat_snmp_basic module is loaded and traffic on port 161 or 162 is NATed, then a remote user can send specially crafted data to trigger a memory error in the snmp_trap_decode() function. Denial of service conditions may occur.
The vulnerability was discovered using the trap-app and trap-enc groups of the PROTOS c06-snmpv1 testsuite.
The original notice is available at:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18
|
Impact:
A remote user can cause denial of service conditions.
|
Solution:
The vendor has issued a fixed kernel version (2.6.16.18), available at:
http://www.kernel.org/
|
Vendor URL: www.kernel.org/ (Links to External Site)
|
Cause:
Exception handling error
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|