7.5
CVSSv3

CVE-2011-2189

Published: 10/10/2011 Updated: 13/02/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

net/core/net_namespace.c in the Linux kernel 2.6.32 and previous versions does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote malicious users to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux 6.0

redhat enterprise mrg 2.0

canonical ubuntu linux 10.10

canonical ubuntu linux 11.04

canonical ubuntu linux 11.10

canonical ubuntu linux 10.04

debian debian linux 5.0

debian debian linux 7.0

debian debian linux 6.0

Vendor Advisories

Debian Bug report logs - #622741 vsftpd: upgrade stable to fix remote DoS (CVE-2011-0762) Package: vsftpd; Maintainer for vsftpd is Keng-Yu Lin <kengyu@lexicaltw>; Source for vsftpd is src:vsftpd (PTS, buildd, popcon) Reported by: Dario Vieli <dario@wualacom> Date: Thu, 14 Apr 2011 10:42:08 UTC Severity: important ...
Vsftpd or other applications could be made to crash if vsftpd received specially crafted network traffic ...

Exploits

source: wwwsecurityfocuscom/bid/50938/info The Linux kernel is prone to a remote denial-of-service vulnerability An attacker can exploit this issue to cause an out-of-memory error in certain linux applications, resulting in denial-of-service conditions Linux kernel versions 2635 and earlier are affected $ for i in 1 2 3 4 5 6 7 8 ...