Vulnerability Description
Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 2.6.8 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/11202/Broken Link
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022Broken Link
- http://www.novell.com/linux/security/advisories/2004_37_kernel.htmlBroken Link
- http://www.securityfocus.com/bid/11488Broken LinkThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17800Third Party AdvisoryVDB Entry
- http://secunia.com/advisories/11202/Broken Link
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022Broken Link
- http://www.novell.com/linux/security/advisories/2004_37_kernel.htmlBroken Link
- http://www.securityfocus.com/bid/11488Broken LinkThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17800Third Party AdvisoryVDB Entry
FAQ
What is CVE-2004-0816?
CVE-2004-0816 is a vulnerability with a CVSS score of 7.5 (HIGH). Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet.
How severe is CVE-2004-0816?
CVE-2004-0816 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0816?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.