CVE-2005-4635
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/12/2005
Last modified:
03/04/2025
Description
The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.2.27:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.3.99:pre1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.3.99:pre3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.3.99:pre4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.3.99:pre5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/18216
- http://secunia.com/advisories/18788
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Dea86575eaf99a9262a969309d934318028dbfacb
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
- http://www.novell.com/linux/security/advisories/2006_06_kernel.html
- http://www.securityfocus.com/bid/16139
- http://www.vupen.com/english/advisories/2006/0035
- http://secunia.com/advisories/18216
- http://secunia.com/advisories/18788
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Dea86575eaf99a9262a969309d934318028dbfacb
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
- http://www.novell.com/linux/security/advisories/2006_06_kernel.html
- http://www.securityfocus.com/bid/16139
- http://www.vupen.com/english/advisories/2006/0035