Vulnerability Details : CVE-2004-0626
The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2004-0626
Probability of exploitation activity in the next 30 days: 1.30%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0626
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2004-0626
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16554
- http://www.novell.com/linux/security/advisories/2004_20_kernel.html
-
http://lwn.net/Articles/91964/
Patch;Vendor Advisory
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852
Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=108861141304495&w=2
-
http://www.gentoo.org/security/en/glsa/glsa-200407-12.xml
Patch;Vendor Advisory
Products affected by CVE-2004-0626
- cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:conectiva:linux:10:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*