CVE-2008-0352
Published Jan 18, 2008
Last updated 7 years ago
Overview
- Description
- The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Vendor comments
- Red HatNot vulnerable. These issues did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02F89C7A-24F2-4518-A605-78A5B7056A1A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C43BA02-0686-42F0-B901-4CB88459E2D1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB1E1A8B-6FA1-45AD-B034-EC34884527DC" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8CBD2D9-3765-40B2-A056-D71BE750CC01" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8F4D967-ED04-42EA-8B3E-36301D39D651" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C498EE89-7F07-4B1E-90E6-5897E6B04670" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "708656AF-92AE-4EAF-AF19-F457DB04ADB7" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B263AB8-74A4-4C73-915C-A02724C24B45" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A96D739B-9E8B-4D2F-9DED-4C9B313473CC" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708" } ], "operator": "OR" } ] } ]