2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2008-0352" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2008-01-18T00:00:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:41:48.907" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram)."
} ,
{
"lang" : "es" ,
"value" : "El n\u00facleo de Linux 2.6.20 hasta 2.6.21.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (error irrecuperable del sistema) mediante cierto paquete IPv6, posiblemente implicando la opci\u00f3n Jumbo Payload salto a salto (jumbogram)."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB445E3E-CCBD-4737-BE30-841B9A79D558"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "02F89C7A-24F2-4518-A605-78A5B7056A1A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C43BA02-0686-42F0-B901-4CB88459E2D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C6940324-0383-4510-BA55-770E0A6B80B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB1E1A8B-6FA1-45AD-B034-EC34884527DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E3313D5-52E8-49B3-B145-170D9A26DA43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "480F035A-A59D-4113-A246-DF108BB2F591"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "30D39E29-B2A0-4075-84AF-994C27AB0A68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19879317-B067-45DA-B497-21EBDDDC2521"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D220C745-28AD-4D04-B2D2-A090D229206E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4AF8895-7BF8-458E-B2BB-68699AABC023"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA768A9D-6C63-405E-9D14-5D68F8E93A91"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF495E58-DA6C-402D-B381-4929CB8A502B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A591301C-C30F-44AC-90F0-709A18AA96E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "610A93BB-70E3-4BF1-83E8-8A7388477F44"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "821BD11F-3C6A-4424-BC9B-DFD786248B07"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50B422D1-6C6E-4359-A169-3EED78A1CF40"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*" ,
"matchCriteriaId" : "C8CBD2D9-3765-40B2-A056-D71BE750CC01"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*" ,
"matchCriteriaId" : "A8F4D967-ED04-42EA-8B3E-36301D39D651"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*" ,
"matchCriteriaId" : "C498EE89-7F07-4B1E-90E6-5897E6B04670"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*" ,
"matchCriteriaId" : "708656AF-92AE-4EAF-AF19-F457DB04ADB7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B263AB8-74A4-4C73-915C-A02724C24B45"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*" ,
"matchCriteriaId" : "A96D739B-9E8B-4D2F-9DED-4C9B313473CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*" ,
"matchCriteriaId" : "4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://bugzilla.kernel.org/show_bug.cgi?id=8450" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39643" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.exploit-db.com/exploits/4893" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://bugzilla.kernel.org/show_bug.cgi?id=8450" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/39643" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.exploit-db.com/exploits/4893" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Not vulnerable. These issues did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5." ,
"lastModified" : "2008-01-21T00:00:00"
2023-04-24 12:24:31 +02:00
}
]
}