Revision Date: | 2013-04-29 | Version: | 11 | Title: | The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873. | Description: | The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2005-2872
| Platform(s): | CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 4
| Product(s): | | Definition Synopsis | RHEL4, CentOS4 or Oracle Linux 4 The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
kernel-smp-devel is earlier than 0:2.6.9-22.EL
OR kernel-hugemem is earlier than 0:2.6.9-22.EL
OR kernel-devel is earlier than 0:2.6.9-22.EL
OR kernel is earlier than 0:2.6.9-22.EL
OR kernel-hugemem-devel is earlier than 0:2.6.9-22.EL
OR kernel-doc is earlier than 0:2.6.9-22.EL
OR kernel-smp is earlier than 0:2.6.9-22.EL
|
|