Lucene search

K
cve[email protected]CVE-2006-0454
HistoryFeb 07, 2006 - 6:06 p.m.

CVE-2006-0454

2006-02-0718:06:00
CWE-399
web.nvd.nist.gov
27
cve-2006-0454
linux kernel
icmp response
denial of service
nvd
security vulnerability
ip options

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

6.1

Confidence

Low

EPSS

0.127

Percentile

95.5%

Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.12
OR
linuxlinux_kernelMatch2.6.12rc1
OR
linuxlinux_kernelMatch2.6.12rc2
OR
linuxlinux_kernelMatch2.6.12rc3
OR
linuxlinux_kernelMatch2.6.12rc4
OR
linuxlinux_kernelMatch2.6.12rc5
OR
linuxlinux_kernelMatch2.6.12rc6
OR
linuxlinux_kernelMatch2.6.12.1
OR
linuxlinux_kernelMatch2.6.12.2
OR
linuxlinux_kernelMatch2.6.12.3
OR
linuxlinux_kernelMatch2.6.12.4
OR
linuxlinux_kernelMatch2.6.12.5
OR
linuxlinux_kernelMatch2.6.12.6
OR
linuxlinux_kernelMatch2.6.13
OR
linuxlinux_kernelMatch2.6.13rc1
OR
linuxlinux_kernelMatch2.6.13rc2
OR
linuxlinux_kernelMatch2.6.13rc3
OR
linuxlinux_kernelMatch2.6.13rc4
OR
linuxlinux_kernelMatch2.6.13rc5
OR
linuxlinux_kernelMatch2.6.13rc6
OR
linuxlinux_kernelMatch2.6.13rc7
OR
linuxlinux_kernelMatch2.6.13.1
OR
linuxlinux_kernelMatch2.6.13.2
OR
linuxlinux_kernelMatch2.6.13.3
OR
linuxlinux_kernelMatch2.6.13.4
OR
linuxlinux_kernelMatch2.6.13.5
OR
linuxlinux_kernelMatch2.6.14
OR
linuxlinux_kernelMatch2.6.14rc1
OR
linuxlinux_kernelMatch2.6.14rc2
OR
linuxlinux_kernelMatch2.6.14rc3
OR
linuxlinux_kernelMatch2.6.14rc4
OR
linuxlinux_kernelMatch2.6.14rc5
OR
linuxlinux_kernelMatch2.6.14.1
OR
linuxlinux_kernelMatch2.6.14.2
OR
linuxlinux_kernelMatch2.6.14.3
OR
linuxlinux_kernelMatch2.6.14.4
OR
linuxlinux_kernelMatch2.6.14.5
OR
linuxlinux_kernelMatch2.6.14.6
OR
linuxlinux_kernelMatch2.6.14.7
OR
linuxlinux_kernelMatch2.6.15
OR
linuxlinux_kernelMatch2.6.15.1
OR
linuxlinux_kernelMatch2.6.15.2
VendorProductVersionCPE
linuxlinux_kernel2.6.13cpe:/o:linux:linux_kernel:2.6.13:rc1::
linuxlinux_kernel2.6.14cpe:/o:linux:linux_kernel:2.6.14:rc5::
linuxlinux_kernel2.6.13cpe:/o:linux:linux_kernel:2.6.13:rc4::
linuxlinux_kernel2.6.13.1cpe:/o:linux:linux_kernel:2.6.13.1:::
linuxlinux_kernel2.6.14cpe:/o:linux:linux_kernel:2.6.14:rc4::
linuxlinux_kernel2.6.12cpe:/o:linux:linux_kernel:2.6.12:rc1::
linuxlinux_kernel2.6.12.3cpe:/o:linux:linux_kernel:2.6.12.3:::
linuxlinux_kernel2.6.14cpe:/o:linux:linux_kernel:2.6.14:::
linuxlinux_kernel2.6.14.6cpe:/o:linux:linux_kernel:2.6.14.6:::
linuxlinux_kernel2.6.15cpe:/o:linux:linux_kernel:2.6.15:::
Rows per page:
1-10 of 421

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

6.1

Confidence

Low

EPSS

0.127

Percentile

95.5%