[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Buffer overflow vulnerability in Linux kernel's virtio-net handled fragmented packets

ID: oval:org.secpod.oval:def:26768Date: (C)2015-09-15   (M)2017-07-11
Class: VULNERABILITYFamily: unix




The host is installed with kernel on RHEL 5, 6, or 7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle kernel's virtio-net handled fragmented packets. Successful exploitation could allow attackers to send crafted packets to a target system.

Platform:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Product:
kernel
Reference:
CVE-2015-5156
CVE    1
CVE-2015-5156
CPE    5
cpe:/o:linux:linux_kernel
cpe:/o:redhat:enterprise_linux:5
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
...

© 2013 SecPod Technologies