CVE-2009-4536

Severity

78%

Complexity

99%

Confidentiality

115%

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.

drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.

CVSS 2.0 Base Score 7.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:C).

Overview

Type

Linux

First reported 15 years ago

2010-01-12 17:30:00

Last updated 6 years ago

2018-11-16 15:51:00

Affected Software

Linux Kernel

Debian GNU/Linux 4.0

4.0

Debian GNU/Linux 5.0

5.0

References

http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/

Third Party Advisory

http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html

Third Party Advisory

FEDORA-2010-1787

Mailing List, Third Party Advisory

SUSE-SA:2010:005

Mailing List, Third Party Advisory

SUSE-SA:2010:007

Mailing List, Third Party Advisory

SUSE-SA:2010:010

Mailing List, Third Party Advisory

SUSE-SA:2010:012

Mailing List, Third Party Advisory

SUSE-SA:2010:013

Mailing List, Third Party Advisory

SUSE-SA:2010:014

Mailing List, Third Party Advisory

http://marc.info/?t=126203102000001&r=1&w=2

Mailing List, Third Party Advisory

35265

Third Party Advisory

38031

Third Party Advisory

38276

Third Party Advisory

38296

Third Party Advisory

38492

Third Party Advisory

38610

Third Party Advisory

38779

Third Party Advisory

1023420

Third Party Advisory, VDB Entry

DSA-1996

Third Party Advisory

DSA-2005

Third Party Advisory

[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389

Mailing List, Third Party Advisory

[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389

Mailing List, Third Party Advisory

[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389

Mailing List, Third Party Advisory

RHSA-2010:0019

Third Party Advisory

RHSA-2010:0020

Third Party Advisory

RHSA-2010:0041

Third Party Advisory

RHSA-2010:0053

Third Party Advisory

RHSA-2010:0111

Third Party Advisory

RHSA-2010:0882

Third Party Advisory

37519

Third Party Advisory, VDB Entry

http://www.vmware.com/security/advisories/VMSA-2011-0009.html

Third Party Advisory

https://bugzilla.redhat.com/show_bug.cgi?id=552126

Issue Tracking, Third Party Advisory

kernel-e1000main-security-bypass(55648)

Third Party Advisory, VDB Entry

oval:org.mitre.oval:def:10607

Third Party Advisory

oval:org.mitre.oval:def:12440

Third Party Advisory

oval:org.mitre.oval:def:13226

Third Party Advisory

oval:org.mitre.oval:def:7453

Third Party Advisory

RHSA-2010:0095

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.