{ "id": "CVE-2008-0352", "sourceIdentifier": "cve@mitre.org", "published": "2008-01-18T00:00:00.000", "lastModified": "2017-09-29T01:30:13.863", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram)." }, { "lang": "es", "value": "El n\u00facleo de Linux 2.6.20 hasta 2.6.21.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (error irrecuperable del sistema) mediante cierto paquete IPv6, posiblemente implicando la opci\u00f3n Jumbo Payload salto a salto (jumbogram)." } ], "vendorComments": [ { "organization": "Red Hat", "comment": "Not vulnerable. These issues did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.", "lastModified": "2008-01-21T00:00:00" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "02F89C7A-24F2-4518-A605-78A5B7056A1A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*", "matchCriteriaId": "2C43BA02-0686-42F0-B901-4CB88459E2D1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:rc2:*:*:*:*:*:*", "matchCriteriaId": "FB1E1A8B-6FA1-45AD-B034-EC34884527DC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", "matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", "matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", "matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", "matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", "matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", "matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", "matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", "matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", "matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", "matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", "matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", "matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", "matchCriteriaId": "821BD11F-3C6A-4424-BC9B-DFD786248B07" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*", "matchCriteriaId": "C8CBD2D9-3765-40B2-A056-D71BE750CC01" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*", "matchCriteriaId": "A8F4D967-ED04-42EA-8B3E-36301D39D651" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*", "matchCriteriaId": "C498EE89-7F07-4B1E-90E6-5897E6B04670" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*", "matchCriteriaId": "708656AF-92AE-4EAF-AF19-F457DB04ADB7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*", "matchCriteriaId": "3B263AB8-74A4-4C73-915C-A02724C24B45" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*", "matchCriteriaId": "A96D739B-9E8B-4D2F-9DED-4C9B313473CC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*", "matchCriteriaId": "4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708" } ] } ] } ], "references": [ { "url": "http://bugzilla.kernel.org/show_bug.cgi?id=8450", "source": "cve@mitre.org" }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.2", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39643", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/4893", "source": "cve@mitre.org" } ] }