CVE-2006-4572
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
07/11/2006
Last modified:
13/02/2023
Description
ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka "ip6_tables protocol bypass bug;" and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka "ip6_tables extension header bypass bug."
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.16.30 (including) | |
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://readlist.com/lists/vger.kernel.org/linux-kernel/55/275979.html
- http://secunia.com/advisories/22731
- http://secunia.com/advisories/22762
- http://secunia.com/advisories/23384
- http://secunia.com/advisories/23474
- http://secunia.com/advisories/24098
- http://secunia.com/advisories/25691
- http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git&a=search&s=CVE-2006-4572
- http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba%3Dcommit%3Bh%3D0ddfcc96928145d6a6425fdd26dad6abfe7f891d
- http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba%3Dcommit%3Bh%3D6ac62be885810e1f8390f0c3b9d3ee451d3d3f19
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.31
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A197
- http://www.novell.com/linux/security/advisories/2006_79_kernel.html
- http://www.securityfocus.com/archive/1/471457
- http://www.securityfocus.com/bid/20955
- http://www.ubuntu.com/usn/usn-395-1
- http://www.ubuntu.com/usn/usn-416-1
- http://www.vupen.com/english/advisories/2006/4386