Vulnerability Name:

CVE-2013-2017 (CCN-83993)

Assigned:2010-05-06
Published:2010-05-06
Updated:2023-02-13
Summary:The veth (aka virtual Ethernet) driver in the Linux kernel before 2.6.34 does not properly manage skbs during congestion, which allows remote attackers to cause a denial of service (system crash) by leveraging lack of skb consumption in conjunction with a double-free error.
CVSS v3 Severity:7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.4 Medium (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
4.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2013-2017

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2013-0911
Important: kernel security, bug fix, and enhancement update

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-59549
Linux Kernel Virtual Ethernet Driver Denial of Service Vulnerability

Source: CCN
Type: Red Hat Bugzilla Bug 957705
CVE-2013-2017 kernel: veth: double-free flaw in case of congestion

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
linux-kernel-cve20132017-dos(83993)

Source: CCN
Type: Linux Kernel GIT Repository
veth: Dont kfree_skb() after dev_forward_skb()

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2013-2017

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.20:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.19:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.33.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:24098
    P
    ELSA-2013:0911: kernel security, bug fix, and enhancement update (Important)
    2014-05-26
    oval:org.mitre.oval:def:20755
    P
    RHSA-2013:0911: kernel security, bug fix, and enhancement update (Important)
    2014-02-17
    oval:com.redhat.rhsa:def:20130911
    P
    RHSA-2013:0911: kernel security, bug fix, and enhancement update (Important)
    2013-06-10
    oval:com.ubuntu.precise:def:20132017000
    V
    CVE-2013-2017 on Ubuntu 12.04 LTS (precise) - medium.
    2013-05-03
    BACK
    linux linux kernel 2.6.33
    linux linux kernel 2.6.33.1
    linux linux kernel 2.6.33.2
    linux linux kernel 2.6.33.3
    linux linux kernel 2.6.33.4
    linux linux kernel 2.6.33.5
    linux linux kernel 2.6.33.6
    linux linux kernel 2.6.33.7
    linux linux kernel 2.6.33.20
    linux linux kernel 2.6.33.17
    linux linux kernel 2.6.33.16
    linux linux kernel 2.6.33.19
    linux linux kernel 2.6.33.18
    linux linux kernel 2.6.33.13
    linux linux kernel 2.6.33.12
    linux linux kernel 2.6.33.15
    linux linux kernel 2.6.33.14
    linux linux kernel 2.6.33.9
    linux linux kernel 2.6.33.8
    linux linux kernel 2.6.33.11
    linux linux kernel 2.6.33.10
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6