Vulnerability Name: | CVE-2009-4272 (CCN-55808) | ||||||||||||||||||||||||
Assigned: | 2009-12-10 | ||||||||||||||||||||||||
Published: | 2010-01-19 | ||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||
Summary: | A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing "emergency" in which a hash chain is too long. Note: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic. | ||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C) 5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
5.8 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2009-4272 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: VMSA-2010-0009 ESXi utilities and ESX Service Console third party updates Source: CCN Type: RHSA-2010-0046 Important: kernel security and bug fix update Source: CCN Type: RHSA-2010-0095 Important: rhev-hypervisor security and bug fix update Source: CCN Type: SA39920 VMware vMA kernel Multiple Vulnerabilities Source: CCN Type: SA39972 VMware ESXi ntp Mode 7 Request Denial of Service Source: CCN Type: SA39973 VMware ESX Multiple krb5 Vulnerabilities Source: CCN Type: SA39974 VMware ESX GCC libtool Search Path Privilege Escalation Security Issue Source: CCN Type: SA39975 VMware ESX gzip unlzw() Integer Underflow Vulnerability Source: CCN Type: SA39976 VMware vMA OpenSSL CRYPTO_free_all_ex_data() Memory Leak Vulnerability Source: CCN Type: SA39977 VMware vMA Multiple krb5 Vulnerabilities Source: CCN Type: SA39979 VMware vMA GCC libtool Search Path Privilege Escalation Security Issue Source: CCN Type: SA39980 VMware vMA gzip unlzw() Integer Underflow Vulnerability Source: CCN Type: SA39981 VMware vMA sudo Privilege Escalation Security Issues Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-37875 Red Hat Linux Kernel Routing Implementation Multiple Remote Denial of Service Vulnerabilities Source: CCN Type: Red Hat Bugzilla Bug 545411 CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN linux-kernel-routing-dos(55808) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |