Vulnerability Name:

CVE-2008-2136 (CCN-42451)

Assigned:2008-05-09
Published:2008-05-09
Updated:2018-10-31
Summary:Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-399
CWE-401
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2008-2136

Source: CONFIRM
Type: Vendor Advisory
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3

Source: SUSE
Type: Third Party Advisory
SUSE-SA:2008:030

Source: SUSE
Type: Third Party Advisory
SUSE-SA:2008:032

Source: CCN
Type: linux-netdev Mailing List, 2008-05-09 4:49:27
When should kfree_skb be used?

Source: MLIST
Type: Mailing List, Third Party Advisory
[linux-kernel] 20080509 Re: When should kfree_skb be used?

Source: CCN
Type: RHSA-2008-0585
Important: kernel security and bug fix update

Source: CCN
Type: RHSA-2008-0607
Important: kernel security and bug fix update

Source: CCN
Type: RHSA-2008-0612
Important: kernel security and bug fix update

Source: CCN
Type: RHSA-2008-0787
Important: kernel security update

Source: CCN
Type: RHSA-2008-0973
Important: kernel security and bug fix update

Source: CCN
Type: RHSA-2009-0001
Important: kernel security update

Source: SECUNIA
Type: Third Party Advisory
30198

Source: CCN
Type: SA30241
Linux Kernel Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
30241

Source: SECUNIA
Type: Third Party Advisory
30276

Source: SECUNIA
Type: Third Party Advisory
30368

Source: CCN
Type: SA30499
Linux Kernel Denial of Service Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
30499

Source: SECUNIA
Type: Third Party Advisory
30818

Source: SECUNIA
Type: Third Party Advisory
30962

Source: SECUNIA
Type: Third Party Advisory
31107

Source: SECUNIA
Type: Third Party Advisory
31198

Source: SECUNIA
Type: Third Party Advisory
31341

Source: SECUNIA
Type: Third Party Advisory
31628

Source: CCN
Type: SA31689
Avaya Products Linux Kernel Local Denial of Service

Source: SECUNIA
Type: Third Party Advisory
31689

Source: SECUNIA
Type: Third Party Advisory
33201

Source: SECUNIA
Type: Third Party Advisory
33280

Source: CCN
Type: SECTRACK ID: 1020118
Linux Kernel Memory Leak in SIT Code ipip6_rcv() Lets Remote Users Deny Service

Source: CONFIRM
Type: Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-362.htm

Source: CCN
Type: ASA-2008-362
kernel security and bug fix update (RHSA-2008-0607)

Source: CCN
Type: ASA-2009-005
kernel security update (RHSA-2009-0001)

Source: CCN
Type: ASA-2009-035
kernel security update (RHSA-2008-0787)

Source: CONFIRM
Type: Broken Link
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169

Source: DEBIAN
Type: Third Party Advisory
DSA-1588

Source: DEBIAN
Type: DSA-1588
linux-2.6 -- denial of service

Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: CONFIRM
Type: Vendor Advisory
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5

Source: CONFIRM
Type: Vendor Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2008:167

Source: MANDRIVA
Type: Third Party Advisory
MDVSA-2008:174

Source: REDHAT
Type: Third Party Advisory
RHSA-2008:0585

Source: REDHAT
Type: Third Party Advisory
RHSA-2008:0607

Source: REDHAT
Type: Third Party Advisory
RHSA-2008:0612

Source: REDHAT
Type: Third Party Advisory
RHSA-2008:0787

Source: REDHAT
Type: Third Party Advisory
RHSA-2008:0973

Source: BID
Type: Third Party Advisory, VDB Entry
29235

Source: CCN
Type: BID-29235
Linux Kernel 'ipip6_rcv()' Remote Denial of Service Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1020118

Source: CCN
Type: USN-625-1
Linux kernel vulnerabilities

Source: UBUNTU
Type: Third Party Advisory
USN-625-1

Source: VUPEN
Type: Third Party Advisory
ADV-2008-1543

Source: VUPEN
Type: Third Party Advisory
ADV-2008-1716

Source: XF
Type: Third Party Advisory, VDB Entry
linux-kernel-ipip6rcv-dos(42451)

Source: XF
Type: UNKNOWN
linux-kernel-ipip6rcv-dos(42451)

Source: OVAL
Type: Broken Link
oval:org.mitre.oval:def:11038

Source: OVAL
Type: Broken Link
oval:org.mitre.oval:def:6503

Source: FEDORA
Type: Third Party Advisory
FEDORA-2008-3949

Source: SUSE
Type: SUSE-SA:2008:030
Linux kernel security update

Source: SUSE
Type: SUSE-SA:2008:032
SUSE Linux Enterprise 10 SP1 Linux kernel

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 2.4.0 and < 2.4.36.5)
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 2.6.0 and < 2.6.25.3)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.25:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:es:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20082136
    V
    CVE-2008-2136
    2017-09-27
    oval:org.mitre.oval:def:28983
    P
    RHSA-2008:0612 -- kernel security and bug fix update (Important)
    2015-08-17
    oval:org.mitre.oval:def:17496
    P
    USN-625-1 -- linux, linux-source-2.6.15/20/22 vulnerabilities
    2014-07-21
    oval:org.mitre.oval:def:18592
    P
    DSA-1588-1 fai-kernels linux-2.6 user-mode-linux - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:8027
    P
    DSA-1588 linux-2.6 -- denial of service
    2014-06-23
    oval:org.mitre.oval:def:22645
    P
    ELSA-2008:0612: kernel security and bug fix update (Important)
    2014-05-26
    oval:org.mitre.oval:def:11038
    V
    Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
    2013-04-29
    oval:org.mitre.oval:def:6503
    V
    Linux Kernel Memory Leak in SIT Code ipip6_rcv() Lets Remote Users Deny Service
    2010-01-11
    oval:com.redhat.rhsa:def:20080973
    P
    RHSA-2008:0973: kernel security and bug fix update (Important)
    2008-12-16
    oval:com.redhat.rhsa:def:20080612
    P
    RHSA-2008:0612: kernel security and bug fix update (Important)
    2008-08-04
    oval:com.redhat.rhsa:def:20080607
    P
    RHSA-2008:0607: kernel security and bug fix update (Important)
    2008-07-23
    oval:org.debian:def:1588
    V
    denial of service
    2008-05-27
    BACK
    linux linux kernel *
    linux linux kernel *
    debian debian linux 4.0
    canonical ubuntu linux 6.06
    canonical ubuntu linux 7.04
    canonical ubuntu linux 7.10
    canonical ubuntu linux 8.04
    linux linux kernel 2.6.25.2
    linux linux kernel 2.6.25
    linux linux kernel 2.6.25.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    redhat enterprise linux 5
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.1 x86_64
    redhat enterprise linux 4.6.z ga
    redhat enterprise linux 4.6.z ga
    novell opensuse 10.2
    novell opensuse 10.3
    mandrakesoft mandrake linux 2008.1
    canonical ubuntu 8.04