cvelist/2009/4xxx/CVE-2009-4536.json

248 lines
8.7 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2009-4536",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385."
2017-10-16 12:31:07 -04:00
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389",
"refsource" : "MLIST",
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2009/12/28/1"
},
{
"name" : "[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389",
"refsource" : "MLIST",
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2009/12/29/2"
},
{
"name" : "[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389",
"refsource" : "MLIST",
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2009/12/31/1"
},
{
"name" : "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/"
},
{
"name" : "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html"
},
{
"name" : "http://marc.info/?t=126203102000001&r=1&w=2",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://marc.info/?t=126203102000001&r=1&w=2"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=552126",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
},
{
"name" : "http://www.vmware.com/security/advisories/VMSA-2011-0009.html",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vmware.com/security/advisories/VMSA-2011-0009.html"
},
{
"name" : "DSA-1996",
"refsource" : "DEBIAN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2010/dsa-1996"
},
{
"name" : "DSA-2005",
"refsource" : "DEBIAN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2010/dsa-2005"
},
{
"name" : "FEDORA-2010-1787",
"refsource" : "FEDORA",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html"
},
{
"name" : "RHSA-2010:0019",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0019.html"
},
{
"name" : "RHSA-2010:0020",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0020.html"
},
{
"name" : "RHSA-2010:0041",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0041.html"
},
{
"name" : "RHSA-2010:0095",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "https://rhn.redhat.com/errata/RHSA-2010-0095.html"
},
{
"name" : "RHSA-2010:0111",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0111.html"
},
{
"name" : "RHSA-2010:0053",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0053.html"
},
{
"name" : "RHSA-2010:0882",
"refsource" : "REDHAT",
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2010-0882.html"
},
{
"name" : "SUSE-SA:2010:012",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html"
},
{
"name" : "SUSE-SA:2010:013",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html"
},
{
"name" : "SUSE-SA:2010:010",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html"
},
{
"name" : "SUSE-SA:2010:005",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html"
},
{
"name" : "SUSE-SA:2010:007",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html"
},
{
"name" : "SUSE-SA:2010:014",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html"
},
{
"name" : "37519",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/37519"
},
{
"name" : "oval:org.mitre.oval:def:10607",
"refsource" : "OVAL",
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10607"
},
{
"name" : "oval:org.mitre.oval:def:7453",
"refsource" : "OVAL",
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7453"
},
{
"name" : "oval:org.mitre.oval:def:12440",
"refsource" : "OVAL",
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12440"
},
{
"name" : "oval:org.mitre.oval:def:13226",
"refsource" : "OVAL",
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13226"
},
{
"name" : "1023420",
"refsource" : "SECTRACK",
2017-10-16 12:31:07 -04:00
"url" : "http://securitytracker.com/id?1023420"
},
{
"name" : "35265",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/35265"
},
{
"name" : "38031",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/38031"
},
{
"name" : "38492",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/38492"
},
{
"name" : "38276",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/38276"
},
{
"name" : "38296",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/38296"
},
{
"name" : "38610",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/38610"
},
{
"name" : "38779",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/38779"
},
{
"name" : "kernel-e1000main-security-bypass(55648)",
"refsource" : "XF",
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/55648"
}
]
}
}