Vulnerability Name: | CVE-2011-4087 (CCN-71699) | ||||||||||||||||||||||||||||
Assigned: | 2011-12-08 | ||||||||||||||||||||||||||||
Published: | 2011-12-08 | ||||||||||||||||||||||||||||
Updated: | 2020-07-27 | ||||||||||||||||||||||||||||
Summary: | The br_parse_ip_options function in net/bridge/br_netfilter.c in the Linux kernel before 2.6.39 does not properly initialize a certain data structure, which allows remote attackers to cause a denial of service by leveraging connectivity to a network interface that uses an Ethernet bridge device. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-665 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2011-4087 Source: CONFIRM Type: Third Party Advisory http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 Source: CONFIRM Type: Exploit, Patch, Vendor Advisory http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f8e9881c2aef1e982e5abc25c046820cd0b7cf64 Source: CCN Type: CVE-2011-4087 Multiple remote denial of service in Linux bridge networking code 2.6.37-3.0 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20111028 Re: CVE Request: Multiple remote denial of service in Linux bridge networking code 2.6.37-3.0 Source: CCN Type: BID-50979 Linux Kernel CVE-2011-4087 Bridge Networking Interface Denial of Service Vulnerability Source: XF Type: UNKNOWN linux-kernel-bni-dos(71699) Source: CONFIRM Type: Exploit, Patch, Third Party Advisory https://github.com/torvalds/linux/commit/f8e9881c2aef1e982e5abc25c046820cd0b7cf64 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |