CERTA-2002-AVI-143
Vulnerability from certfr_avis

Une vulnérabilité a été trouvée dans la mise en oeuvre du protocole ICMP dans certaines versions du noyau Linux.

Description

Un individu mal intentionné peut envoyer des paquets ICMP fragmentés afin de récupérer en retour des paquets ICMP de type "TTL Exceeded", contenant une partie de la mémoire précédement allouée.

Solution

Mettre à jour le noyau Linux selon la version et l'éditeur (cf. Documentation).

Les distributions Red Hat et Mandrake possédant un noyau 2.2.X ou une version antérieure à 2.4.0-pre*.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eLes distributions \u003cCODE\u003eRed Hat\u003c/CODE\u003e et  \u003cCODE\u003eMandrake\u003c/CODE\u003e poss\u00e9dant un noyau 2.2.X ou une version  ant\u00e9rieure \u00e0 2.4.0-pre*.\u003c/P\u003e",
  "content": "## Description\n\nUn individu mal intentionn\u00e9 peut envoyer des paquets ICMP fragment\u00e9s\nafin de r\u00e9cup\u00e9rer en retour des paquets ICMP de type \"TTL Exceeded\",\ncontenant une partie de la m\u00e9moire pr\u00e9c\u00e9dement allou\u00e9e.\n\n## Solution\n\nMettre \u00e0 jour le noyau Linux selon la version et l\u0027\u00e9diteur (cf.\nDocumentation).\n",
  "cves": [],
  "initial_release_date": "2002-07-08T00:00:00",
  "last_revision_date": "2002-07-08T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 #RHSA-2002:007-16 de Red Hat :",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-007.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 #MDKSA-2002:041 de Mandrake :",
      "url": "http://www.mandrakesecure.net/en/advisories/2002/MDKSA-2002-041.php"
    }
  ],
  "reference": "CERTA-2002-AVI-143",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2002-07-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Divulgation de donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 trouv\u00e9e dans la mise en oeuvre du protocole ICMP\ndans certaines versions du noyau Linux.\n",
  "title": "Vuln\u00e9rabilit\u00e9 ICMP dans le noyau Linux",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Mandrake",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…