### [CVE-2009-4536](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. ### POC #### Reference - http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ - http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ #### Github No PoCs found on GitHub currently.