CVE-2006-0454

Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value.
References
Link Resource
http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html Patch
http://marc.info/?l=linux-kernel&m=113927617401569&w=2
http://marc.info/?l=linux-kernel&m=113927648820694&w=2
http://secunia.com/advisories/18766 Patch Vendor Advisory
http://secunia.com/advisories/18774 Patch Vendor Advisory
http://secunia.com/advisories/18784 Patch Vendor Advisory
http://secunia.com/advisories/18788 Patch Vendor Advisory
http://secunia.com/advisories/18861 Patch Vendor Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3
http://www.mandriva.com/security/advisories?name=MDKSA-2006:040
http://www.novell.com/linux/security/advisories/2006_06_kernel.html Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.securityfocus.com/bid/16532 Patch
http://www.trustix.org/errata/2006/0006 Vendor Advisory
http://www.ubuntu.com/usn/usn-250-1
http://www.vupen.com/english/advisories/2006/0464 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24575
http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html Patch
http://marc.info/?l=linux-kernel&m=113927617401569&w=2
http://marc.info/?l=linux-kernel&m=113927648820694&w=2
http://secunia.com/advisories/18766 Patch Vendor Advisory
http://secunia.com/advisories/18774 Patch Vendor Advisory
http://secunia.com/advisories/18784 Patch Vendor Advisory
http://secunia.com/advisories/18788 Patch Vendor Advisory
http://secunia.com/advisories/18861 Patch Vendor Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3
http://www.mandriva.com/security/advisories?name=MDKSA-2006:040
http://www.novell.com/linux/security/advisories/2006_06_kernel.html Patch Vendor Advisory
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.securityfocus.com/bid/16532 Patch
http://www.trustix.org/errata/2006/0006 Vendor Advisory
http://www.ubuntu.com/usn/usn-250-1
http://www.vupen.com/english/advisories/2006/0464 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24575
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:06

Type Values Removed Values Added
References () http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html - Patch () http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html - Patch
References () http://marc.info/?l=linux-kernel&m=113927617401569&w=2 - () http://marc.info/?l=linux-kernel&m=113927617401569&w=2 -
References () http://marc.info/?l=linux-kernel&m=113927648820694&w=2 - () http://marc.info/?l=linux-kernel&m=113927648820694&w=2 -
References () http://secunia.com/advisories/18766 - Patch, Vendor Advisory () http://secunia.com/advisories/18766 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18774 - Patch, Vendor Advisory () http://secunia.com/advisories/18774 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18784 - Patch, Vendor Advisory () http://secunia.com/advisories/18784 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18788 - Patch, Vendor Advisory () http://secunia.com/advisories/18788 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18861 - Patch, Vendor Advisory () http://secunia.com/advisories/18861 - Patch, Vendor Advisory
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3 - () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:040 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:040 -
References () http://www.novell.com/linux/security/advisories/2006_06_kernel.html - Patch, Vendor Advisory () http://www.novell.com/linux/security/advisories/2006_06_kernel.html - Patch, Vendor Advisory
References () http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html - Patch, Vendor Advisory () http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/427981/100/0/threaded - () http://www.securityfocus.com/archive/1/427981/100/0/threaded -
References () http://www.securityfocus.com/bid/16532 - Patch () http://www.securityfocus.com/bid/16532 - Patch
References () http://www.trustix.org/errata/2006/0006 - Vendor Advisory () http://www.trustix.org/errata/2006/0006 - Vendor Advisory
References () http://www.ubuntu.com/usn/usn-250-1 - () http://www.ubuntu.com/usn/usn-250-1 -
References () http://www.vupen.com/english/advisories/2006/0464 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0464 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24575 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24575 -

Information

Published : 2006-02-07 18:06

Updated : 2024-11-21 00:06


NVD link : CVE-2006-0454

Mitre link : CVE-2006-0454

CVE.ORG link : CVE-2006-0454


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors