First published: Fri Nov 25 2005(Updated: )
The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.14 | |
Linux Kernel | =2.6.14-rc1 | |
Linux Kernel | =2.6.14-rc2 | |
Linux Kernel | =2.6.14-rc3 | |
Linux Kernel | =2.6.14-rc4 | |
Linux Kernel | =2.6.14.1 | |
Linux Kernel | =2.6.14.2 | |
Linux Kernel | =2.6.14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3809 is considered a denial of service vulnerability that can cause a kernel oops.
To fix CVE-2005-3809, update the Linux kernel to a version later than 2.6.14.3.
CVE-2005-3809 affects Linux kernel versions from 2.6.14 up to and including 2.6.14.3.
The impact of CVE-2005-3809 is that it allows attackers to trigger a kernel oops leading to a denial of service.
CVE-2005-3809 is largely outdated but remains relevant for any systems still running the affected versions of the Linux kernel.