CVE-2004-0626

The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type.
Configurations

Configuration 1 (hide)

cpe:2.3:o:conectiva:linux:10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 - Patch, Vendor Advisory () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 - Patch, Vendor Advisory
References () http://lwn.net/Articles/91964/ - Patch, Vendor Advisory () http://lwn.net/Articles/91964/ - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=108861141304495&w=2 - () http://marc.info/?l=bugtraq&m=108861141304495&w=2 -
References () http://www.gentoo.org/security/en/glsa/glsa-200407-12.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200407-12.xml - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2004_20_kernel.html - () http://www.novell.com/linux/security/advisories/2004_20_kernel.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16554 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16554 -

Information

Published : 2004-12-06 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0626

Mitre link : CVE-2004-0626

CVE.ORG link : CVE-2004-0626


JSON object : View

Products Affected

gentoo

  • linux

suse

  • suse_linux

conectiva

  • linux

linux

  • linux_kernel