Vulnerability Name:

CVE-2009-1298 (CCN-54617)

Assigned:2009-11-09
Published:2009-11-09
Updated:2018-10-10
Summary:The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.
CVSS v3 Severity:7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2009-1298

Source: CONFIRM
Type: UNKNOWN
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bbf31bf18d34caa87dd01f08bf713635593697f2

Source: SUSE
Type: UNKNOWN
SUSE-SA:2010:001

Source: SECUNIA
Type: Vendor Advisory
37624

Source: SECUNIA
Type: UNKNOWN
38017

Source: MISC
Type: UNKNOWN
http://twitter.com/spendergrsec/statuses/6339560349

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/Advisories:rPSA-2009-0161

Source: CCN
Type: The Linux Kernel Archives Web site
Changelog 2.6.31.6

Source: CONFIRM
Type: UNKNOWN
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2009:329

Source: OSVDB
Type: UNKNOWN
60788

Source: CCN
Type: OSVDB ID: 60788
Linux Kernel net/ipv4/ip_fragment.c ip_frag_reasm Function NULL Dereference Remote DoS

Source: BUGTRAQ
Type: UNKNOWN
20091216 rPSA-2009-0161-1 hwdata kernel

Source: CCN
Type: BID-37231
Linux Kernel 'ip_frag_reasm() ' Null Pointer Deference Remote Denial of Service Vulnerability

Source: MISC
Type: UNKNOWN
http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/

Source: CCN
Type: USN-869-1
Linux kernel vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-869-1

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=544144

Source: XF
Type: UNKNOWN
linux-kernel-ipfragreasm-dos(54617)

Source: FEDORA
Type: UNKNOWN
FEDORA-2009-12786

Source: FEDORA
Type: UNKNOWN
FEDORA-2009-12825

Source: SUSE
Type: SUSE-SA:2010:001
Linux kernel security update

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.6.28:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30:rc7-git6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.32:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.32:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:*:rc8:*:*:*:*:*:* (Version <= 2.6.32)

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:git7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:*
  • AND
  • cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20091298
    V
    CVE-2009-1298
    2015-11-16
    oval:org.mitre.oval:def:13928
    P
    USN-869-1 -- linux vulnerability
    2014-06-30
    BACK
    linux linux kernel 2.6.28
    linux linux kernel 2.6.28 rc1
    linux linux kernel 2.6.28 rc2
    linux linux kernel 2.6.28 rc3
    linux linux kernel 2.6.28 rc4
    linux linux kernel 2.6.28 rc5
    linux linux kernel 2.6.28 rc6
    linux linux kernel 2.6.28 rc7
    linux linux kernel 2.6.28.1
    linux linux kernel 2.6.28.2
    linux linux kernel 2.6.28.3
    linux linux kernel 2.6.28.4
    linux linux kernel 2.6.28.5
    linux linux kernel 2.6.28.6
    linux linux kernel 2.6.28.7
    linux linux kernel 2.6.28.8
    linux linux kernel 2.6.28.9
    linux linux kernel 2.6.28.10
    linux linux kernel 2.6.29
    linux linux kernel 2.6.29 rc2
    linux linux kernel 2.6.29 rc2_git7
    linux linux kernel 2.6.29 rc8-kk
    linux linux kernel 2.6.29.1
    linux linux kernel 2.6.29.2
    linux linux kernel 2.6.29.3
    linux linux kernel 2.6.29.4
    linux linux kernel 2.6.29.5
    linux linux kernel 2.6.29.6
    linux linux kernel 2.6.30
    linux linux kernel 2.6.30 rc1
    linux linux kernel 2.6.30 rc2
    linux linux kernel 2.6.30 rc3
    linux linux kernel 2.6.30 rc4
    linux linux kernel 2.6.30 rc5
    linux linux kernel 2.6.30 rc6
    linux linux kernel 2.6.30 rc7-git6
    linux linux kernel 2.6.30.1
    linux linux kernel 2.6.30.2
    linux linux kernel 2.6.30.3
    linux linux kernel 2.6.30.4
    linux linux kernel 2.6.30.5
    linux linux kernel 2.6.30.6
    linux linux kernel 2.6.30.7
    linux linux kernel 2.6.30.8
    linux linux kernel 2.6.30.9
    linux linux kernel 2.6.31
    linux linux kernel 2.6.31 rc1
    linux linux kernel 2.6.31 rc2
    linux linux kernel 2.6.31 rc3
    linux linux kernel 2.6.31 rc4
    linux linux kernel 2.6.31 rc5
    linux linux kernel 2.6.31 rc6
    linux linux kernel 2.6.31 rc7
    linux linux kernel 2.6.31 rc8
    linux linux kernel 2.6.31.1
    linux linux kernel 2.6.31.2
    linux linux kernel 2.6.31.3
    linux linux kernel 2.6.31.4
    linux linux kernel 2.6.31.5
    linux linux kernel 2.6.31.6
    linux linux kernel 2.6.32
    linux linux kernel 2.6.32 rc1
    linux linux kernel 2.6.32 rc3
    linux linux kernel 2.6.32 rc4
    linux linux kernel 2.6.32 rc5
    linux linux kernel 2.6.32 rc6
    linux linux kernel 2.6.32 rc7
    linux linux kernel * rc8
    linux linux kernel 2.6.28 rc1
    linux linux kernel 2.6.28 rc5
    linux linux kernel 2.6.28 rc2
    linux linux kernel 2.6.28 rc3
    linux linux kernel 2.6.28 rc4
    linux linux kernel 2.6.28 rc7
    linux linux kernel 2.6.28
    linux linux kernel 2.6.28.1
    linux linux kernel 2.6.28 git7
    linux linux kernel 2.6.28.2
    linux linux kernel 2.6.28.3
    linux linux kernel 2.6.28.4
    linux linux kernel 2.6.28 rc6
    linux linux kernel 2.6.28.5
    linux linux kernel 2.6.28.6
    linux linux kernel 2.6.29 rc2
    linux linux kernel 2.6.28.7
    linux linux kernel 2.6.28.8
    linux linux kernel 2.6.28.9
    linux linux kernel 2.6.29 rc1
    linux linux kernel 2.6.29 git1
    linux linux kernel 2.6.29
    linux linux kernel 2.6.28.10
    linux linux kernel 2.6.29 rc8-kk
    linux linux kernel 2.6.29 rc2_git7
    linux linux kernel 2.6.28 rc1
    mandriva linux 2009.1
    mandriva linux 2009.1
    mandriva linux 2010
    mandriva linux 2010