Vulnerability Description
The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a different vulnerability than CVE-2012-2663.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.0.38 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=826702Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/fdf5af0daf8019cec2396cdef8fb042d80fe71fPatchThird Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=826702Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/fdf5af0daf8019cec2396cdef8fb042d80fe71fPatchThird Party Advisory
FAQ
What is CVE-2012-6638?
CVE-2012-6638 is a vulnerability with a CVSS score of 7.8 (HIGH). The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN T...
How severe is CVE-2012-6638?
CVE-2012-6638 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6638?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.