10
CVSSv2

CVE-2009-4538

Published: 12/01/2010 Updated: 16/11/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and previous versions does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote malicious users to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 4.0

debian debian linux 5.0

Vendor Advisories

Amerigo Wang and Eric Sesterhenn discovered that the HFS and ext4 filesystems did not correctly check certain disk structures If a user were tricked into mounting a specially crafted filesystem, a remote attacker could crash the system or gain root privileges (CVE-2009-4020, CVE-2009-4308) ...
NOTE: This kernel update marks the final planned kernel security update for the 2624 kernel in the Debian release 'etch' Although security support for 'etch' officially ended on Feburary 15th, 2010, this update was already in preparation before that date Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix one security issue and one bug are nowavailable for Red Hat Enterprise Linux 47 Extended Update SupportThe Red Hat Security Response Team has rated this update as having ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix two security issues and several bugs arenow available for Red Hat Enterprise Linux 52 Extended Update SupportThe Red Hat Security Response Team has rated this update as ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 47 Extended Update SupportThis update has been rated as having important security impact by the RedHat Securit ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 4The Red Hat Security Response Team has rated this update as havingimportant secur ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and two bugs arenow available for Red Hat Enterprise Linux 53 Extended Update SupportThis update has been rated as having important security imp ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 52 Extended Update SupportThis update has been rated as having important security ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix three security issues and multiple bugsare now available for Red Hat Enterprise Linux 53 Extended Update SupportThe Red Hat Security Response Team has rated this update ...

References

NVD-CWE-noinfohttp://www.securityfocus.com/bid/37523http://www.openwall.com/lists/oss-security/2009/12/29/2http://securitytracker.com/id?1023420http://www.openwall.com/lists/oss-security/2009/12/31/1http://www.openwall.com/lists/oss-security/2009/12/28/1https://bugzilla.redhat.com/show_bug.cgi?id=551214http://www.redhat.com/support/errata/RHSA-2010-0019.htmlhttp://secunia.com/advisories/38031http://www.redhat.com/support/errata/RHSA-2010-0020.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0041.htmlhttps://rhn.redhat.com/errata/RHSA-2010-0095.htmlhttp://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0111.htmlhttp://www.debian.org/security/2010/dsa-1996http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.htmlhttp://secunia.com/advisories/38492http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.htmlhttp://secunia.com/advisories/38276http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.htmlhttp://secunia.com/advisories/38296http://www.debian.org/security/2010/dsa-2005http://www.redhat.com/support/errata/RHSA-2010-0053.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:066http://secunia.com/advisories/38610http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.htmlhttp://secunia.com/advisories/38779https://exchange.xforce.ibmcloud.com/vulnerabilities/55645https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9702https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7016https://usn.ubuntu.com/894-1/https://nvd.nist.gov