Vulnerability Description
The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.14 |
References
- http://marc.info/?l=linux-kernel&m=113269476105016&w=2
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.14.3
- http://www.osvdb.org/24114
- http://marc.info/?l=linux-kernel&m=113269476105016&w=2
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.14.3
- http://www.osvdb.org/24114
FAQ
What is CVE-2005-3809?
CVE-2005-3809 is a vulnerability with a CVSS score of 7.8 (HIGH). The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without priv...
How severe is CVE-2005-3809?
CVE-2005-3809 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3809?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.