Revision Date: | 2014-01-20 | Version: | 6 |
Title: | VMware hosted product updates, ESX patches and VI Client update resolve multiple security issues |
Description: | drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. |
Family: | unix | Class: | vulnerability |
Status: | ACCEPTED | Reference(s): | CVE-2009-4536
|
Platform(s): | VMWare ESX Server 3.5 VMWare ESX Server 4.0 VMWare ESX Server 4.1
| Product(s): | |
Definition Synopsis |
Patch ESX410-201110225-SG is not installed VMware ESX Server 4.1 is installed
AND Patch ESX410-201110225-SG is not installed
OR Patch ESX400-201110410-SG is not installed
VMware ESX Server 4.0 is installed
AND Patch ESX400-201110410-SG is not installed
OR Patch ESX350-201105404-SG is not installed
VMware ESX Server 3.5.0 is installed
AND Patch ESX350-201105404-SG does not exist
|