7.8
CVSSv2

CVE-2009-1298

Published: 08/12/2009 Updated: 07/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 695
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions prior to 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote malicious users to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.28

linux linux kernel 2.6.29

linux linux kernel 2.6.31

linux linux kernel 2.6.29.3

linux linux kernel 2.6.32

linux linux kernel 2.6.31.3

linux linux kernel 2.6.30

linux linux kernel 2.6.31.4

linux linux kernel 2.6.31.6

linux linux kernel 2.6.28.4

linux linux kernel 2.6.28.2

linux linux kernel 2.6.28.5

linux linux kernel 2.6.31.1

linux linux kernel 2.6.30.7

linux linux kernel 2.6.29.4

linux linux kernel 2.6.30.8

linux linux kernel 2.6.30.9

linux linux kernel 2.6.28.8

linux linux kernel 2.6.29.1

linux linux kernel 2.6.30.4

linux linux kernel 2.6.28.3

linux linux kernel

linux linux kernel 2.6.29.6

linux linux kernel 2.6.28.9

linux linux kernel 2.6.30.2

linux linux kernel 2.6.30.6

linux linux kernel 2.6.30.1

linux linux kernel 2.6.28.6

linux linux kernel 2.6.31.5

linux linux kernel 2.6.28.7

linux linux kernel 2.6.29.2

linux linux kernel 2.6.31.2

linux linux kernel 2.6.30.5

linux linux kernel 2.6.28.1

linux linux kernel 2.6.28.10

linux linux kernel 2.6.30.3

linux linux kernel 2.6.29.5

Vendor Advisories

David Ford discovered that the IPv4 defragmentation routine did not correctly handle oversized packets A remote attacker could send specially crafted traffic that would cause a system to crash, leading to a denial of service (The fix was included in the earlier kernels from USN-864-1) (CVE-2009-1298) ...