First published: Fri May 16 2008(Updated: )
Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=2.4.0<2.4.36.5 | |
Linux kernel | >=2.6.0<2.6.25.3 | |
Debian | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Linux Kernel | >=2.4.0<2.4.36.5 | |
Linux Kernel | >=2.6.0<2.6.25.3 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2136 has a medium severity rating as it allows remote attackers to cause denial of service through memory consumption.
To fix CVE-2008-2136, upgrade to Linux kernel version 2.4.36.5 or higher for the 2.4 series, or 2.6.25.3 or higher for the 2.6 series.
CVE-2008-2136 affects Linux kernel versions prior to 2.4.36.5 and 2.6.25.3, along with specific versions of Debian and Ubuntu Linux.
Yes, CVE-2008-2136 can be exploited remotely by sending crafted network traffic to a Simple Internet Transition (SIT) tunnel interface.
The impact of CVE-2008-2136 is denial of service, causing the affected system to experience memory leaks and potential crashes.