Max CVSS | 7.8 | Min CVSS | 4.7 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2007-2172 | 4.7 |
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, I
|
19-10-2018 - 18:59 | 22-04-2007 - 19:19 | |
CVE-2007-2242 | 7.8 |
The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
|
16-10-2018 - 16:42 | 25-04-2007 - 16:19 | |
CVE-2007-1861 | 4.9 |
The nl_fib_lookup function in net/ipv4/fib_frontend.c in Linux Kernel before 2.6.20.8 allows attackers to cause a denial of service (kernel panic) via NETLINK_FIB_LOOKUP replies, which trigger infinite recursion and a stack overflow.
|
16-10-2018 - 16:40 | 07-05-2007 - 19:19 | |
CVE-2007-1497 | 5.0 |
nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fr
|
11-10-2017 - 01:31 | 16-03-2007 - 22:19 | |
CVE-2007-1592 | 4.9 |
net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6
|
11-10-2017 - 01:31 | 22-03-2007 - 19:19 | |
CVE-2007-1496 | 4.9 |
nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) brid
|
11-10-2017 - 01:31 | 16-03-2007 - 22:19 |