Vulnerability Description
drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.6.32.3 |
| Debian | Debian Linux | 5.0 |
Related Weaknesses (CWE)
References
- http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/Third Party Advisory
- http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.hMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.htmlMailing ListThird Party Advisory
- http://marc.info/?l=linux-netdev&m=126202972828626&w=2Mailing ListThird Party Advisory
- http://marc.info/?t=126202986900002&r=1&w=2Mailing ListThird Party Advisory
- http://secunia.com/advisories/38031Third Party Advisory
- http://secunia.com/advisories/38610Third Party Advisory
- http://secunia.com/advisories/39742Third Party Advisory
- http://secunia.com/advisories/39830Third Party Advisory
- http://secunia.com/advisories/40645Third Party Advisory
- http://securitytracker.com/id?1023419Third Party AdvisoryVDB Entry
- http://twitter.com/dakami/statuses/7104238406Third Party Advisory
- http://www.debian.org/security/2010/dsa-2053Third Party Advisory
- http://www.novell.com/linux/security/advisories/2010_23_kernel.htmlThird Party Advisory
FAQ
What is CVE-2009-4537?
CVE-2009-4537 is a vulnerability with a CVSS score of 7.8 (HIGH). drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause ...
How severe is CVE-2009-4537?
CVE-2009-4537 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4537?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.