Vulnerability Details : CVE-2006-6333
The tr_rx function in ibmtr.c for Linux kernel 2.6.19 assigns the wrong flag to the ip_summed field, which allows remote attackers to cause a denial of service (memory corruption) via crafted packets that cause the kernel to interpret another field as an offset.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2006-6333
- cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
Threat overview for CVE-2006-6333
Top countries where our scanners detected CVE-2006-6333
Top open port discovered on systems with this issue
80
IPs affected by CVE-2006-6333 3
Find out if you* are
affected by CVE-2006-6333!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-6333
0.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6333
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
References for CVE-2006-6333
-
http://www.vupen.com/english/advisories/2006/4907
-
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ee28b0da1069ced1688aa9d0b7b378353b988321
Vendor Advisory
-
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=0d97e10ccac580e16d3dffbe4a9a88144360e64a;hp=bfe59865b1dd50e5c4dbd4cefe506a31e1495a1a;hb=ee28b0da1069ced1688aa9d0b7b378353b988321;f=drivers/net/tokenring/ibmtr.c
Patch
-
http://www.securityfocus.com/bid/21490
Jump to