CVE-2014-3535
Published Sep 28, 2014
Last updated 2 years ago
Overview
- Description
- include/linux/netdevice.h in the Linux kernel before 2.6.36 incorrectly uses macros for netdev_printk and its related logging implementation, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) by sending invalid packets to a VxLAN interface.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C162EC4-E7AD-47B4-B974-EF9F9468E80F", "versionEndIncluding": "2.6.35.13" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5480B0CF-B462-4172-9F6E-D94B451CF869" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17ACC235-F2C3-42B5-9244-DCCDC4704BA8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA4BC3D2-70FF-4EED-9DC8-B378F88F4D36" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7ACC123-06D8-4A3F-8730-AA7FF6EFBD35" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F6891F7-2B07-4A96-A0D6-AC528B7E0DD8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "657BCE5D-DC8B-4BE2-AED8-BC52C738F999" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "160E9402-241A-44AE-A92A-9629CA656F38" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2CD9FB1-AB83-427A-8923-97ED7ADFD63D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B2E5B71-BF7F-426A-BE5E-0481010725E0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4540D1DF-9ED8-45DB-B868-BD195DDCB8B5" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB33FE45-7254-4F8D-AC22-0FEA559A8567" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52E43E71-2F62-40E5-BF56-15D26806B7AA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B422B61F-AE80-4F86-AACA-F86EE47983A5" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDA2DB37-7A2D-400D-889E-36175DCDF3FB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40C2CAA9-8EAF-43C7-B0CE-D1A09663C49B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA1CA35C-5F52-4095-B0EA-7A22481F4360" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDB46950-0C6F-4A13-9425-3FCAF3C09A75" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55189BDD-5644-4B48-A94E-E71977F3376F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.35.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1DACBA1-004B-4416-A52B-235A607181AA" } ], "operator": "OR" } ] } ]