Buffer overflow vulnerability in Linux kernel's virtio-net handled fragmented packets
|ID: oval:org.secpod.oval:def:26768||Date: (C)2015-09-15 (M)2017-11-07|
|Class: VULNERABILITY||Family: unix|
The host is installed with kernel on RHEL 5, 6, or 7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle kernel's virtio-net handled fragmented packets. Successful exploitation could allow attackers to send crafted packets to a target system.
|Red Hat Enterprise Linux 5|
|Red Hat Enterprise Linux 6|
|Red Hat Enterprise Linux 7|