Vulnerability Name: | CVE-2004-1137 (CCN-18481) |
Assigned: | 2004-12-14 |
Published: | 2004-12-14 |
Updated: | 2018-05-03 |
Summary: | Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read. |
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Privileges |
References: | Source: CCN Type: BugTraq Mailing List, Tue Dec 14 2004 - 04:31:21 CST Linux kernel IGMP vulnerabilities
Source: MITRE Type: CNA CVE-2004-1137
Source: CONECTIVA Type: UNKNOWN CLA-2005:930
Source: MISC Type: UNKNOWN http://isec.pl/vulnerabilities/isec-0018-igmp.txt
Source: BUGTRAQ Type: UNKNOWN 20041214 [USN-38-1] Linux kernel vulnerabilities
Source: CCN Type: RHSA-2004-689 kernel security update
Source: CCN Type: RHSA-2005-092 kernel security update
Source: CCN Type: CIAC Information Bulletin P-081 Linux Kernel Vulnerabilities
Source: MANDRAKE Type: UNKNOWN MDKSA-2005:022
Source: SUSE Type: UNKNOWN SUSE-SA:2004:044
Source: REDHAT Type: UNKNOWN RHSA-2005:092
Source: CCN Type: BID-11917 Linux Kernel IGMP Multiple Vulnerabilities
Source: CCN Type: TLSA-2005-29 Multiple vulnerabilities exist in the Linux kernel
Source: CCN Type: USN-38-1 Linux kernel vulnerabilities
Source: CCN Type: Trustix Secure Linux Advisory #2004-0068 Local hole, remote DoS
Source: FEDORA Type: UNKNOWN FLSA:2336
Source: XF Type: UNKNOWN linux-ipmcsource-code-execution(18481)
Source: XF Type: UNKNOWN linux-ipmcsource-code-execution(18481)
Source: XF Type: UNKNOWN linux-igmpmarksources-dos(18482)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11144
Source: SUSE Type: SUSE-SA:2004:044 kernel: various kernel problems
Source: SUSE Type: SUSE-SR:2004:004 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2004:005 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration 1: cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.22:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.23:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.6:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.7:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Vulnerability Name: | CVE-2004-1137 (CCN-18482) |
Assigned: | 2004-12-14 |
Published: | 2004-12-14 |
Updated: | 2004-12-14 |
Summary: | Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read. |
CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Consequences: | Denial of Service |
References: | Source: CCN Type: BugTraq Mailing List, Tue Dec 14 2004 - 04:31:21 CST Linux kernel IGMP vulnerabilities
Source: MITRE Type: CNA CVE-2004-1137
Source: CCN Type: RHSA-2004-689 kernel security update
Source: CCN Type: RHSA-2005-092 kernel security update
Source: CCN Type: CIAC Information Bulletin P-081 Linux Kernel Vulnerabilities
Source: CCN Type: BID-11917 Linux Kernel IGMP Multiple Vulnerabilities
Source: CCN Type: TLSA-2005-29 Multiple vulnerabilities exist in the Linux kernel
Source: CCN Type: USN-38-1 Linux kernel vulnerabilities
Source: CCN Type: Trustix Secure Linux Advisory #2004-0068 Local hole, remote DoS
Source: XF Type: UNKNOWN linux-igmpmarksources-dos(18482)
Source: SUSE Type: SUSE-SA:2004:044 kernel: various kernel problems
Source: SUSE Type: SUSE-SR:2004:004 SUSE Security Summary Report
Source: SUSE Type: SUSE-SR:2004:005 SUSE Security Summary Report
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:linux:linux_kernel:2.4.3:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.22:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.11:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19::-pre1:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19::-pre2:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19::-pre3:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19::-pre4:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19::-pre5:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.19::-pre6:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21::-pre1:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21::-pre4:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.21::-pre7:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.23:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.23::-ow2:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.23::-pre9:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.24::-ow1:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27::-pre1:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27::-pre2:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27::-pre3:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27::-pre4:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.27::-pre5:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.2:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.0:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.1:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.3:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.4:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.5:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.6:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.7:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*AND cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*OR cpe:/o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:*OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:*OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:workgroup:*:server:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:20041137 | V | CVE-2004-1137 | 2015-11-16 | oval:org.mitre.oval:def:11144 | V | Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read. | 2013-04-29 | oval:com.redhat.rhsa:def:20050092 | P | RHSA-2005:092: kernel security update (Important) | 2005-02-18 | oval:com.redhat.rhsa:def:20040689 | P | RHSA-2004:689: kernel security update (Important) | 2004-12-23 |
|
BACK |
linux linux kernel 2.4.0
linux linux kernel 2.4.0 test1
linux linux kernel 2.4.0 test10
linux linux kernel 2.4.0 test11
linux linux kernel 2.4.0 test12
linux linux kernel 2.4.0 test2
linux linux kernel 2.4.0 test3
linux linux kernel 2.4.0 test4
linux linux kernel 2.4.0 test5
linux linux kernel 2.4.0 test6
linux linux kernel 2.4.0 test7
linux linux kernel 2.4.0 test8
linux linux kernel 2.4.0 test9
linux linux kernel 2.4.1
linux linux kernel 2.4.2
linux linux kernel 2.4.3
linux linux kernel 2.4.4
linux linux kernel 2.4.5
linux linux kernel 2.4.6
linux linux kernel 2.4.7
linux linux kernel 2.4.8
linux linux kernel 2.4.9
linux linux kernel 2.4.10
linux linux kernel 2.4.11
linux linux kernel 2.4.12
linux linux kernel 2.4.13
linux linux kernel 2.4.14
linux linux kernel 2.4.15
linux linux kernel 2.4.16
linux linux kernel 2.4.17
linux linux kernel 2.4.18
linux linux kernel 2.4.18
linux linux kernel 2.4.18 pre1
linux linux kernel 2.4.18 pre2
linux linux kernel 2.4.18 pre3
linux linux kernel 2.4.18 pre4
linux linux kernel 2.4.18 pre5
linux linux kernel 2.4.18 pre6
linux linux kernel 2.4.18 pre7
linux linux kernel 2.4.18 pre8
linux linux kernel 2.4.19
linux linux kernel 2.4.19 pre1
linux linux kernel 2.4.19 pre2
linux linux kernel 2.4.19 pre3
linux linux kernel 2.4.19 pre4
linux linux kernel 2.4.19 pre5
linux linux kernel 2.4.19 pre6
linux linux kernel 2.4.20
linux linux kernel 2.4.21
linux linux kernel 2.4.21 pre1
linux linux kernel 2.4.21 pre4
linux linux kernel 2.4.21 pre7
linux linux kernel 2.4.22
linux linux kernel 2.4.23
linux linux kernel 2.4.23 pre9
linux linux kernel 2.4.23_ow2
linux linux kernel 2.4.24
linux linux kernel 2.4.24_ow1
linux linux kernel 2.4.25
linux linux kernel 2.4.26
linux linux kernel 2.4.27
linux linux kernel 2.4.27 pre1
linux linux kernel 2.4.27 pre2
linux linux kernel 2.4.27 pre3
linux linux kernel 2.4.27 pre4
linux linux kernel 2.4.27 pre5
linux linux kernel 2.4.28
linux linux kernel 2.6.0
linux linux kernel 2.6.0 test1
linux linux kernel 2.6.0 test10
linux linux kernel 2.6.0 test11
linux linux kernel 2.6.0 test2
linux linux kernel 2.6.0 test3
linux linux kernel 2.6.0 test4
linux linux kernel 2.6.0 test5
linux linux kernel 2.6.0 test6
linux linux kernel 2.6.0 test7
linux linux kernel 2.6.0 test8
linux linux kernel 2.6.0 test9
linux linux kernel 2.6.1
linux linux kernel 2.6.1 rc1
linux linux kernel 2.6.1 rc2
linux linux kernel 2.6.2
linux linux kernel 2.6.3
linux linux kernel 2.6.4
linux linux kernel 2.6.5
linux linux kernel 2.6.6
linux linux kernel 2.6.6 rc1
linux linux kernel 2.6.7
linux linux kernel 2.6.7 rc1
linux linux kernel 2.6.8
linux linux kernel 2.6.8 rc1
linux linux kernel 2.6.8 rc2
linux linux kernel 2.6.8 rc3
linux linux kernel 2.6.9 2.6.20
linux linux kernel 2.6_test9_cvs
ubuntu ubuntu linux 4.1
ubuntu ubuntu linux 4.1
linux linux kernel 2.4.3
linux linux kernel 2.4.4
linux linux kernel 2.4.5
linux linux kernel 2.4.6
linux linux kernel 2.4.18
linux linux kernel 2.4.20
linux linux kernel 2.4.22
linux linux kernel 2.4.7
linux linux kernel 2.4.27
linux linux kernel 2.6.6 rc1
linux linux kernel 2.4.21
linux linux kernel 2.4.28
linux linux kernel 2.4.0
linux linux kernel 2.4.0 test1
linux linux kernel 2.4.0 test10
linux linux kernel 2.4.0 test11
linux linux kernel 2.4.0 test12
linux linux kernel 2.4.0 test2
linux linux kernel 2.4.0 test3
linux linux kernel 2.4.0 test4
linux linux kernel 2.4.0 test5
linux linux kernel 2.4.0 test6
linux linux kernel 2.4.0 test7
linux linux kernel 2.4.0 test8
linux linux kernel 2.4.0 test9
linux linux kernel 2.4.1
linux linux kernel 2.4.10
linux linux kernel 2.4.11
linux linux kernel 2.4.12
linux linux kernel 2.4.13
linux linux kernel 2.4.14
linux linux kernel 2.4.15
linux linux kernel 2.4.16
linux linux kernel 2.4.17
linux linux kernel 2.4.18 pre1
linux linux kernel 2.4.18 pre2
linux linux kernel 2.4.18 pre3
linux linux kernel 2.4.18 pre4
linux linux kernel 2.4.18 pre5
linux linux kernel 2.4.18 pre6
linux linux kernel 2.4.18 pre7
linux linux kernel 2.4.18 pre8
linux linux kernel 2.4.19
linux linux kernel 2.4.19
linux linux kernel 2.4.19
linux linux kernel 2.4.19
linux linux kernel 2.4.19
linux linux kernel 2.4.19
linux linux kernel 2.4.19
linux linux kernel 2.4.2
linux linux kernel 2.4.21
linux linux kernel 2.4.21
linux linux kernel 2.4.21
linux linux kernel 2.4.23
linux linux kernel 2.4.23
linux linux kernel 2.4.23
linux linux kernel 2.4.24
linux linux kernel 2.4.24
linux linux kernel 2.4.25
linux linux kernel 2.4.26
linux linux kernel 2.4.27
linux linux kernel 2.4.27
linux linux kernel 2.4.27
linux linux kernel 2.4.27
linux linux kernel 2.4.27
linux linux kernel 2.4.8
linux linux kernel 2.4.9
linux linux kernel 2.6.2
linux linux kernel 2.6.0 test9
linux linux kernel 2.6.0 test8
linux linux kernel 2.6.0 test7
linux linux kernel 2.6.0 test6
linux linux kernel 2.6.0 test5
linux linux kernel 2.6.0 test4
linux linux kernel 2.6.0 test3
linux linux kernel 2.6.0 test2
linux linux kernel 2.6.0 test11
linux linux kernel 2.6.0 test10
linux linux kernel 2.6.0 test1
linux linux kernel 2.6.8 rc3
linux linux kernel 2.6.8 rc2
linux linux kernel 2.6.8 rc1
linux linux kernel 2.6.7 rc1
linux linux kernel 2.6.1 rc2
linux linux kernel 2.6.1 rc1
linux linux kernel 2.4.18
linux linux kernel 2.6.0
linux linux kernel 2.6.1
linux linux kernel 2.6.3
linux linux kernel 2.6.4
linux linux kernel 2.6.5
linux linux kernel 2.6.6
linux linux kernel 2.6.7
linux linux kernel 2.6.8
suse suse linux 8.1
suse linux enterprise server 8
mandrakesoft mandrake multi network firewall 8.2
mandrakesoft mandrake linux corporate server 2.1
suse suse linux 8.2
suse suse linux 9.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux 10.1
suse suse linux 1.0
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
novell linux desktop 9
redhat enterprise linux 4
redhat enterprise linux 4
suse linux enterprise server 9
mandrakesoft mandrake linux 10.1
turbolinux turbolinux home *
turbolinux turbolinux appliance server 1.0_hosting_edition
turbolinux turbolinux appliance server 1.0_workgroup_edition
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1