summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2005-4635
blob: f0696f608082b64e96d561ed7d7e516eb7dceee7 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Candidate: CVE-2005-4635
References: 
 MISC:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea86575eaf99a9262a969309d934318028dbfacb
 CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
 BID:16139
 URL:http://www.securityfocus.com/bid/16139
 FRSIRT:ADV-2006-0035
 URL:http://www.frsirt.com/english/advisories/2006/0035
 SECUNIA:18216
 URL:http://secunia.com/advisories/18216 
Description: 
 The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15
 does not check for valid lengths of the header and payload, which allows
 remote attackers to cause a denial of service (invalid memory reference) via
 malformed fib_lookup netlink messages.
Notes: 
 dannf> Well, I don't know how it could be exploited by an unpriveleged user -  dannf> but I don't think we need to worry about it.  The vulnerable function
 dannf> wasn't added until after 2.6.12, and is already fixed in 2.6.15.
Bugs: 
upstream: released (2.6.15)
linux-2.6: released (2.6.15-1)
2.6.8-sarge-security: N/A
2.4.27-sarge-security: N/A
2.4.19-woody-security: N/A
2.4.18-woody-security: N/A
2.4.17-woody-security: N/A
2.4.16-woody-security: N/A
2.4.17-woody-security-hppa: N/A
2.4.17-woody-security-ia64: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy