First published: Mon Dec 28 2009(Updated: )
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=2.6.32.3 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =4.0 | |
redhat/kernel-rt | <0:2.6.24.7-146.el5 | 0:2.6.24.7-146.el5 |
redhat/kernel | <0:2.6.18-164.10.1.el5 | 0:2.6.18-164.10.1.el5 |
redhat/kernel | <0:2.6.18-92.1.35.el5 | 0:2.6.18-92.1.35.el5 |
redhat/kernel | <0:2.6.18-128.12.1.el5 | 0:2.6.18-128.12.1.el5 |
redhat/rhev-hypervisor | <0:5.4-2.1.8.el5_4 | 0:5.4-2.1.8.el5_4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)