vendor:
Linux Kernel
by:
Andrea Arcangeli
7.2
CVSS
HIGH
Packet Length with Options Vulnerability
119
CWE
Product Name: Linux Kernel
Affected Version From: 2.0.34
Affected Version To: 2.0.38
Patch Exists: YES
Related CWE: N/A
CPE: o:linux:linux_kernel
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2000
Debian 2.1,Linux kernel 2.0.34/2.0.35/2.0.36/2.0.37/2.0.38,RedHat 5.2 i386 Packet Length with Options Vulnerability
A vulnerability in the Linux kernel's TCP/IP allows local users to crash, hang or corrupt the system. A local user can crash, hang or currupt the system by sending out a packet with options longer than the maximum IP packet length. An easy way to generate such packet is by using the command 'ping -s 65468 -R ANYADDRESS'. The -R option is for the IP record route option. Under kernel versions 2.2.X the command will fail with an message of 'message too long'. The vulnerability seems to be the result of the kernel not checking aif packet with options is longer than the maximum packet size. A long packet seems to lead to memory corruption.
Mitigation:
Ensure that the kernel is updated to the latest version and that all security patches are applied.