Linux Kernel "icmp_send ()" null pointer references Remote Denial of Service Vulnerability

Source: Internet
Author: User

Release date:
Updated on:

Affected Systems:
Linux kernel 2.6.38.6
Linux kernel 2.6.38.4
Linux kernel 2.6.38.3
Description:
--------------------------------------------------------------------------------
Bugtraq id: 47872

Linux Kernel is the Kernel used by open source Linux.

Linux Kernel "icmp_send ()" has a remote denial of service vulnerability in the implementation of NULL pointer reference. Remote attackers can exploit this vulnerability to cause the affected Kernel to crash and DOS legitimate users, you may also execute arbitrary code.

In the icmp_send () (net/ipv4/icmp. c) function, the parameters sent to the dev_net () function are not correctly verified, and can be used to export NULL pointer references that cause the kernel to crash. Attackers can exploit this bug and cause DoS attacks on specified targets or any 2.6.38.x machines connected to the local network. To cause a crash, attackers need to use IPv4 fragment packets to impact the target. Important Fields in IP Packets:
* Flags: The MF flag must be set;
* Fragment ID: uses the pseudo-random value of this field to quickly fill in the shard queue in the victim kernel, so that it cannot easily re-collect received packets;
* TOS: using the pseudo-random value of this field can trigger the creation of multiple route cache items of the same target address, increasing the error rate.

<* Source: Aristide Fattori
Robert to Paleari (roberto.paleari@emaze.net)

Link: http://marc.info /? L = bugtraq & m = 130556487606617 & w = 2
*>

Suggestion:
--------------------------------------------------------------------------------
Vendor patch:

Linux
-----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:

Http://www.kernel.org/

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.