vendor:
Kernel
by:
prdelka
7.8
CVSS
HIGH
Denial of Service (DoS)
476
CWE
Product Name: Kernel
Affected Version From: 2.6.37
Affected Version To: 2.6.x
Patch Exists: YES
Related CWE: CVE-2010-4165
CPE: 2.6.37
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=52062, https://www.infosecmatter.com/nessus-plugin-library/?id=51949, https://www.infosecmatter.com/nessus-plugin-library/?id=68206, https://www.infosecmatter.com/nessus-plugin-library/?id=60965, https://www.infosecmatter.com/nessus-plugin-library/?id=55591, https://www.infosecmatter.com/nessus-plugin-library/?id=51614, https://www.infosecmatter.com/nessus-plugin-library/?id=65103
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2010
Linux Kernel <= 2.6.37 local kernel DoS (CVE-2010-4165)
A divide by 0 error occurs in tcp_select_initial_window when processing user supplied TCP_MAXSEG facilitating a local denial-of-service condition (kernel oops!) in all Linux Kernel 2.6.x branch (2.6.37 & below). This issue can be triggered easily with a call to setsockopt() on a listening network socket and then establishing a TCP connection to the awaiting socket.
Mitigation:
Apply the patch for CVE-2010-4165