CVE-2004-0592

Current Description

The tcp_find_option function of the netfilter subsystem for IPv6 in the SUSE Linux 2.6.5 kernel with USAGI patches, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type, a similar flaw to CVE-2004-0626.

Basic Data

PublishedDecember 31, 2004
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSSuseSuse Linux2.6.5*******

Vulnerable Software List

VendorProductVersions
Suse Suse Linux 2.6.5

References

NameSourceURLTags
20040703 Re: SUSE Security Announcement: kernel (SUSE-SA:2004:020)http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023408.htmlFULLDISC
SUSE-SA:2004:020http://www.novell.com/linux/security/advisories/2004_20_kernel.htmlSUSEPATCH Vendor Advisory
linux-kernel-tcpfindoption-dos(43137)https://exchange.xforce.ibmcloud.com/vulnerabilities/43137XF