First published: Wed Apr 05 2006(Updated: )
The default configuration of syslogd in the Linux sysklogd package does not enable the -x (disable name lookups) option, which allows remote attackers to cause a denial of service (traffic amplification) via messages with spoofed source IP addresses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1624 has a medium severity rating due to its potential for causing denial of service via traffic amplification.
To fix CVE-2006-1624, configure syslogd to enable the -x option to disable name lookups.
CVE-2006-1624 affects the Linux sysklogd package in versions of the Linux kernel prior to 2.6.20.1.
Yes, exploit attempts for CVE-2006-1624 can potentially be detected through unusual spikes in network traffic or patterns consistent with denial of service attacks.
Yes, CVE-2006-1624 is still relevant today as many legacy systems running older versions of Linux may remain vulnerable.