Vulnerability Description
ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka "ip6_tables protocol bypass bug;" and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka "ip6_tables extension header bypass bug."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.16.30 |
Related Weaknesses (CWE)
References
- http://readlist.com/lists/vger.kernel.org/linux-kernel/55/275979.htmlPatch
- http://secunia.com/advisories/22731PatchVendor Advisory
- http://secunia.com/advisories/22762PatchVendor Advisory
- http://secunia.com/advisories/23384Vendor Advisory
- http://secunia.com/advisories/23474Vendor Advisory
- http://secunia.com/advisories/24098Vendor Advisory
- http://secunia.com/advisories/25691Vendor Advisory
- http://www.kernel.org/git/?p=linux%2Fkernel%2Fgit%2Fstable%2Flinux-2.6.16.y.git&
- http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=comm
- http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=comm
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.31
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
- http://www.novell.com/linux/security/advisories/2006_79_kernel.html
- http://www.securityfocus.com/archive/1/471457
- http://www.securityfocus.com/bid/20955
FAQ
What is CVE-2006-4572?
CVE-2006-4572 is a vulnerability with a CVSS score of 7.5 (HIGH). ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after...
How severe is CVE-2006-4572?
CVE-2006-4572 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4572?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.