CVE-2004-0626

The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type.
Configurations

Configuration 1 (hide)

cpe:2.3:o:conectiva:linux:10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-12-06 05:00

Updated : 2024-02-28 10:24


NVD link : CVE-2004-0626

Mitre link : CVE-2004-0626

CVE.ORG link : CVE-2004-0626


JSON object : View

Products Affected

linux

  • linux_kernel

suse

  • suse_linux

gentoo

  • linux

conectiva

  • linux