Vulnerability Description
The tcp_find_option function of the netfilter subsystem for IPv6 in the SUSE Linux 2.6.5 kernel with USAGI patches, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type, a similar flaw to CVE-2004-0626.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suse | Suse Linux | 2.6.5 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023408.html
- http://www.novell.com/linux/security/advisories/2004_20_kernel.htmlPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43137
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023408.html
- http://www.novell.com/linux/security/advisories/2004_20_kernel.htmlPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43137
FAQ
What is CVE-2004-0592?
CVE-2004-0592 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The tcp_find_option function of the netfilter subsystem for IPv6 in the SUSE Linux 2.6.5 kernel with USAGI patches, when using iptables and TCP options rules, allows remote attackers to cause a denial...
How severe is CVE-2004-0592?
CVE-2004-0592 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0592?
Check the references section above for vendor advisories and patch information. Affected products include: Suse Suse Linux.