4.4
CVSSv2

CVE-2007-1388

Published: 10/03/2007 Updated: 11/10/2017
CVSS v2 Base Score: 4.4 | Impact Score: 6.9 | Exploitability Score: 2.7
VMScore: 445
Vector: AV:L/AC:M/Au:S/C:N/I:N/A:C

Vulnerability Summary

The do_ipv6_setsockopt function in net/ipv6/ipv6_sockglue.c in Linux kernel prior to 2.6.20, and possibly other versions, allows local users to cause a denial of service (oops) by calling setsockopt with the IPV6_RTHDR option name and possibly a zero option length or invalid option value, which triggers a NULL pointer dereference.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.0

linux linux kernel 2.6.1

linux linux kernel 2.6.2

linux linux kernel 2.6.10

linux linux kernel 2.6.11

linux linux kernel 2.6.11.1

linux linux kernel 2.6.11.2

linux linux kernel 2.6.11.3

linux linux kernel 2.6.11.4

linux linux kernel 2.6.11.5

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11.9

linux linux kernel 2.6.11.10

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.12

linux linux kernel 2.6.12

linux linux kernel 2.6.12.1

linux linux kernel 2.6.12.2

linux linux kernel 2.6.12.3

linux linux kernel 2.6.12.4

linux linux kernel 2.6.12.5

linux linux kernel 2.6.12.6

linux linux kernel 2.6.13

linux linux kernel 2.6.13.1

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13.3

linux linux kernel 2.6.13.4

linux linux kernel 2.6.13.5

linux linux kernel 2.6.14

linux linux kernel 2.6.14.1

linux linux kernel 2.6.14.2

linux linux kernel 2.6.14.3

linux linux kernel 2.6.14.4

linux linux kernel 2.6.14.5

linux linux kernel 2.6.14.6

linux linux kernel 2.6.14.7

linux linux kernel 2.6.15

linux linux kernel 2.6.15.1

linux linux kernel 2.6.15.2

linux linux kernel 2.6.15.3

linux linux kernel 2.6.15.4

linux linux kernel 2.6.15.5

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.7

linux linux kernel 2.6.16

linux linux kernel 2.6.16.1

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.5

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.7

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16.9

linux linux kernel 2.6.16.10

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.13

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.15

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.18

linux linux kernel 2.6.16.19

linux linux kernel 2.6.16.20

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.23

linux linux kernel 2.6.16.24

linux linux kernel 2.6.16.25

linux linux kernel 2.6.16.26

linux linux kernel 2.6.16.27

linux linux kernel 2.6.16.28

linux linux kernel 2.6.16.29

linux linux kernel 2.6.16.30

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.32

linux linux kernel 2.6.16.33

linux linux kernel 2.6.16.34

linux linux kernel 2.6.16.35

linux linux kernel 2.6.16.36

linux linux kernel 2.6.16.37

linux linux kernel 2.6.16.38

linux linux kernel 2.6.16.39

linux linux kernel 2.6.16.40

linux linux kernel 2.6.16.41

linux linux kernel 2.6.16.42

linux linux kernel 2.6.16.43

linux linux kernel 2.6.16.44

linux linux kernel 2.6.16.45

linux linux kernel 2.6.16.46

linux linux kernel 2.6.16.47

linux linux kernel 2.6.16.48

linux linux kernel 2.6.16.49

linux linux kernel 2.6.16.50

linux linux kernel 2.6.16.51

linux linux kernel 2.6.16.52

linux linux kernel 2.6.16.53

linux linux kernel 2.6.16.54

linux linux kernel 2.6.16.55

linux linux kernel 2.6.16.56

linux linux kernel 2.6.16.57

linux linux kernel 2.6.16.58

linux linux kernel 2.6.16.59

linux linux kernel 2.6.16.60

linux linux kernel 2.6.16.61

linux linux kernel 2.6.16.62

linux linux kernel 2.6.17

linux linux kernel 2.6.17.1

linux linux kernel 2.6.17.2

linux linux kernel 2.6.17.3

linux linux kernel 2.6.17.4

linux linux kernel 2.6.17.5

linux linux kernel 2.6.17.6

linux linux kernel 2.6.17.7

linux linux kernel 2.6.17.8

linux linux kernel 2.6.17.9

linux linux kernel 2.6.17.10

linux linux kernel 2.6.17.11

linux linux kernel 2.6.17.12

linux linux kernel 2.6.17.13

linux linux kernel 2.6.17.14

linux linux kernel 2.6.18

linux linux kernel 2.6.18.1

linux linux kernel 2.6.18.2

linux linux kernel 2.6.18.3

linux linux kernel 2.6.18.4

linux linux kernel 2.6.18.5

linux linux kernel 2.6.18.6

linux linux kernel 2.6.18.7

linux linux kernel 2.6.18.8

linux linux kernel 2.6.19

linux linux kernel 2.6.19.1

linux linux kernel 2.6.19.2

linux linux kernel 2.6.19.3

linux linux kernel 2.6.19.4

linux linux kernel 2.6.19.5

linux linux kernel 2.6.19.6

linux linux kernel

Vendor Advisories

Philipp Richter discovered that the AppleTalk protocol handler did not sufficiently verify the length of packets By sending a crafted AppleTalk packet, a remote attacker could exploit this to crash the kernel (CVE-2007-1357) ...

Exploits

/* source: wwwsecurityfocuscom/bid/23142/info The Linux kernel is prone to a NULL-pointer dereference vulnerability A local attacker can exploit this issue to crash the affected application, denying service to legitimate users The attacker may also be able to execute arbitrary code with elevated privileges, but this has not been confir ...