CERTA-2004-AVI-224
Vulnerability from certfr_avis - Published: - Updated:None
Description
netfilter est le système de manipulation de paquets (filtrage,
traduction d'adresses...) pour les noyaux Linux de la série 2.4 et
2.6.
Une vulnérabilité dans netfilter pour les noyaux Linux de la série 2.6
permet à un utilisateur mal intentionné de réaliser un déni de service
sur la machine victime (consommation de toute la CPU).
Contournement provisoire
Pour les noyaux Linux 2.6, ne pas utiliser l'option de filtrage TCP de netfilter -tcp-option.
Solution
Se référer à la section Documentation pour l'obtention des correctifs.
Toutes les versions de netfilter inclus dans les noyaux Linux 2.6.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eToutes les versions de \u003cTT\u003enetfilter\u003c/TT\u003e inclus dans les noyaux Linux 2.6.\u003c/p\u003e",
"content": "## Description\n\nnetfilter est le syst\u00e8me de manipulation de paquets (filtrage,\ntraduction d\u0027adresses...) pour les noyaux Linux de la s\u00e9rie 2.4 et\n2.6. \nUne vuln\u00e9rabilit\u00e9 dans netfilter pour les noyaux Linux de la s\u00e9rie 2.6\npermet \u00e0 un utilisateur mal intentionn\u00e9 de r\u00e9aliser un d\u00e9ni de service\nsur la machine victime (consommation de toute la CPU).\n\n## Contournement provisoire\n\nPour les noyaux Linux 2.6, ne pas utiliser l\u0027option de filtrage TCP de\nnetfilter -tcp-option.\n\n## Solution\n\nSe r\u00e9f\u00e9rer \u00e0 la section Documentation pour l\u0027obtention des correctifs.\n",
"cves": [],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200407-12 du 14 juillet 2004 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200407-12.xml"
},
{
"title": "Site Internet de netfilter :",
"url": "http://www.netfilter.org"
}
],
"reference": "CERTA-2004-AVI-224",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-07-06T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo.",
"revision_date": "2004-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de netfilter dans les noyaux Linux 2.6",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 netfilter du 30 juin 2004",
"url": "http://www.netfilter.org/security/2004-06-30-2.6-tcpoption.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…