7.5
CVSSv3

CVE-2011-2699

Published: 24/05/2012 Updated: 13/02/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 695
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The IPv6 implementation in the Linux kernel prior to 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote malicious users to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux 4.0

redhat enterprise mrg 2.0

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and various bugsare now available for Red Hat Enterprise Linux 56 Extended Update SupportThe Red Hat Security Response Team has rated this update ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and various bugsare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant secur ...
IPv6 fragment identification value generation could allow a remote attacker to disrupt a target system's networking, preventing legitimate users from accessing its services (CVE-2011-2699, Important) A signedness issue was found in the Linux kernel's CIFS (Common Internet File System) implementation A malicious CIFS server could send a specially- ...
Several security issues were fixed in the kernel ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Several security issues were fixed in the kernel ...
Multiple kernel flaws have been fixed ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Multiple kernel flaws have been fixed ...
Several security issues were fixed in the kernel ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...

Exploits

Ubuntu Security Notice 1202-1 - Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly A local user could exploit this to read kernel stack memory, leading to a loss of privacy Brad Spengler discovered that stack memory for new a process was not correctly calculated A local attacker could exploit this to crash ...