[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-8215Date: (C)2015-12-15   (M)2024-03-21


net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272. NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
BID-85274
DSA-3364
RHSA-2016:0855
SUSE-SU-2015:2194
SUSE-SU-2015:2292
SUSE-SU-2015:2339
SUSE-SU-2015:2350
SUSE-SU-2016:0354
SUSE-SU-2016:2074
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77751427a1ff25b27d47a4c36b12c3c8667855ac
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
https://bugs.launchpad.net/bugs/1500810
https://bugzilla.novell.com/show_bug.cgi?id=944296
https://bugzilla.redhat.com/show_bug.cgi?id=1192132
https://github.com/torvalds/linux/commit/77751427a1ff25b27d47a4c36b12c3c8667855ac

CPE    1
cpe:/o:linux:linux_kernel:3.19
CWE    1
CWE-20
OVAL    13
oval:org.secpod.oval:def:204270
oval:org.secpod.oval:def:1501480
oval:org.secpod.oval:def:501694
oval:org.secpod.oval:def:1501481
...

© SecPod Technologies