ID CVE-2005-3272
Summary Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets.
References
Vulnerable Configurations
  • cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 03-10-2018 - 21:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
oval via4
accepted 2013-04-29T04:02:23.941-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets.
family unix
id oval:org.mitre.oval:def:10157
status accepted
submitted 2010-07-09T03:56:16-04:00
title Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets.
version 29
redhat via4
advisories
rhsa
id RHSA-2006:0493
rpms
  • kernel-0:2.6.9-34.0.1.EL
  • kernel-debuginfo-0:2.6.9-34.0.1.EL
  • kernel-devel-0:2.6.9-34.0.1.EL
  • kernel-doc-0:2.6.9-34.0.1.EL
  • kernel-hugemem-0:2.6.9-34.0.1.EL
  • kernel-hugemem-devel-0:2.6.9-34.0.1.EL
  • kernel-largesmp-0:2.6.9-34.0.1.EL
  • kernel-largesmp-devel-0:2.6.9-34.0.1.EL
  • kernel-smp-0:2.6.9-34.0.1.EL
  • kernel-smp-devel-0:2.6.9-34.0.1.EL
refmap via4
bid 15536
confirm
debian DSA-922
mandriva MDKSA-2007:025
secunia
  • 18056
  • 20237
  • 21745
ubuntu USN-219-1
Last major update 03-10-2018 - 21:31
Published 21-10-2005 - 01:02
Last modified 03-10-2018 - 21:31
Back to Top