First published: Thu Nov 29 2007(Updated: )
The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:2.6.24.7-74.el5 | 0:2.6.24.7-74.el5 |
redhat/kernel | <0:2.6.18-53.1.21.el5 | 0:2.6.18-53.1.21.el5 |
Red Hat Enterprise Linux Desktop | =4 | |
Red Hat Enterprise Linux | =as_4 | |
Red Hat Enterprise Linux | =es_4 | |
Red Hat Enterprise Linux | =ws_4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2007-6282 is classified as a denial of service vulnerability, potentially allowing a system crash.
To fix CVE-2007-6282, update the Linux kernel to version 2.6.25 or later.
CVE-2007-6282 affects Linux kernel versions prior to 2.6.25.
Red Hat Enterprise Linux versions AS 4, ES 4, WS 4, and the Red Hat Enterprise Linux Desktop version 4 are vulnerable to CVE-2007-6282.
This vulnerability can be exploited by remote routers sending crafted fragmented ESP packets.