CVE-2005-0209
CVSS7.8
发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:08:30
NMCO    

[原文]Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via crafted IP packet fragments.


[CNNVD]Linux内核多个漏洞(CNNVD-200505-010)

        Linux kernel 2.6.8.1的Netfilter允许远程攻击者通过精心制作的IP信息包来引起拒绝服务(内核崩溃)攻击。

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11855The directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attackers to cause a denial of service (cupsd ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0209
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0209
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-010
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000945
(PATCH)  CONECTIVA  CLA-2005:945
http://marc.info/?l=bugtraq&m=111091402626556&w=2
(UNKNOWN)  BUGTRAQ  20050315 [USN-95-1] Linux kernel vulnerabilities
http://www.novell.com/linux/security/advisories/2005_18_kernel.html
(VENDOR_ADVISORY)  SUSE  SUSE-SA:2005:018
http://www.redhat.com/support/errata/RHSA-2005-366.html
(UNKNOWN)  REDHAT  RHSA-2005:366
http://www.redhat.com/support/errata/RHSA-2005-420.html
(UNKNOWN)  REDHAT  RHSA-2005:420
http://www.securityfocus.com/bid/12598
(UNKNOWN)  BID  12598

- 漏洞信息

Linux内核多个漏洞
高危 资料不足
2005-05-02 00:00:00 2005-10-20 00:00:00
本地  
        Linux kernel 2.6.8.1的Netfilter允许远程攻击者通过精心制作的IP信息包来引起拒绝服务(内核崩溃)攻击。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        RedHat Fedora Core1
        RedHat kernel-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1 .2199.5.legacy.nptl.athlon.rpm
        RedHat kernel-2.4.22-1.2199.5.legacy.nptl.i586.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1 .2199.5.legacy.nptl.i586.rpm
        RedHat kernel-2.4.22-1.2199.5.legacy.nptl.i686.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-2.4.22-1 .2199.5.legacy.nptl.i686.rpm
        RedHat kernel-BOOT-2.4.22-1.2199.5.legacy.nptl.i386.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-BOOT-2.4 .22-1.2199.5.legacy.nptl.i386.rpm
        RedHat kernel-doc-2.4.22-1.2199.5.legacy.nptl.i386.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-doc-2.4. 22-1.2199.5.legacy.nptl.i386.rpm
        RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.athlon.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4. 22-1.2199.5.legacy.nptl.athlon.rpm
        RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.i586.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4. 22-1.2199.5.legacy.nptl.i586.rpm
        RedHat kernel-smp-2.4.22-1.2199.5.legacy.nptl.i686.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-smp-2.4. 22-1.2199.5.legacy.nptl.i686.rpm
        RedHat kernel-source-2.4.22-1.2199.5.legacy.nptl.i386.rpm
        Fedora Core 1:
        http://download.fedoralegacy.org/fedora/1/updates/i386/kernel-source-2 .4.22-1.2199.5.legacy.nptl.i386.rpm
        Linux kernel 2.6
        Debian kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-amd64-generic_103sarge1_amd64.deb
        Debian kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-amd64-k8-smp_103sarge1_amd64.deb
        Debian kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-amd64-k8_103sarge1_amd64.deb
        Debian kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-em64t-p4-smp_103sarge1_amd64.deb
        Debian kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-amd64 /kernel-headers-2.6-em64t-p4_103sarge1_amd64.deb
        Debian kernel-headers-2.6-generic_101sarge1_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha /kernel-headers-2.6-generic_101sarge1_alpha.deb
        Debian kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64 /kernel-headers-2.6-itanium-smp_2.6.8-14sarge2_ia64.deb
        Debian kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-image-2.6.8-ia64 /kernel-headers-2.6-itanium_2.6.8-14sarge2_ia64.deb
        Debian kernel-headers-2.6-smp_101sarge1_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-alpha /kernel-headers-2.6-smp_101sarge1_alpha.deb
        Debian kernel-headers-2.6-sparc32_101sarge1_sparc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc /kernel-headers-2.6-sparc32_101sarge1_sparc.deb
        Debian kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/k/kernel-latest-2.6-sparc /kernel-headers-2.6-sparc64-smp_101sarge1_sparc.deb
        Debian kernel-headers-2.6-sparc64_101sarge1_sparc.deb
        Debian GNU/Linux 3.1 al

- 漏洞信息

14965
Linux Kernel Netfliter IP Packet Fragment DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-03-15 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站