CERTA-2002-AVI-143
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été trouvée dans la mise en oeuvre du protocole ICMP dans certaines versions du noyau Linux.
Description
Un individu mal intentionné peut envoyer des paquets ICMP fragmentés afin de récupérer en retour des paquets ICMP de type "TTL Exceeded", contenant une partie de la mémoire précédement allouée.
Solution
Mettre à jour le noyau Linux selon la version et l'éditeur (cf. Documentation).
Les distributions Red Hat et Mandrake possédant un noyau 2.2.X ou une version antérieure à 2.4.0-pre*.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eLes distributions \u003cCODE\u003eRed Hat\u003c/CODE\u003e et \u003cCODE\u003eMandrake\u003c/CODE\u003e poss\u00e9dant un noyau 2.2.X ou une version ant\u00e9rieure \u00e0 2.4.0-pre*.\u003c/P\u003e",
"content": "## Description\n\nUn individu mal intentionn\u00e9 peut envoyer des paquets ICMP fragment\u00e9s\nafin de r\u00e9cup\u00e9rer en retour des paquets ICMP de type \"TTL Exceeded\",\ncontenant une partie de la m\u00e9moire pr\u00e9c\u00e9dement allou\u00e9e.\n\n## Solution\n\nMettre \u00e0 jour le noyau Linux selon la version et l\u0027\u00e9diteur (cf.\nDocumentation).\n",
"cves": [],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 #RHSA-2002:007-16 de Red Hat :",
"url": "http://www.redhat.com/support/errata/RHSA-2002-007.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 #MDKSA-2002:041 de Mandrake :",
"url": "http://www.mandrakesecure.net/en/advisories/2002/MDKSA-2002-041.php"
}
],
"reference": "CERTA-2002-AVI-143",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2002-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Divulgation de donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 trouv\u00e9e dans la mise en oeuvre du protocole ICMP\ndans certaines versions du noyau Linux.\n",
"title": "Vuln\u00e9rabilit\u00e9 ICMP dans le noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…