Executive Summary

Informations
Name CVE-2005-3275 First vendor Publication 2005-10-20
Vendor Cve Last vendor Modification 2011-03-07

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10142
 
Oval ID: oval:org.mitre.oval:def:10142
Title: The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
Description: The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
Family: unix Class: vulnerability
Reference(s): CVE-2005-3275
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os117

OpenVAS Exploits

DateDescription
2009-10-10Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5015723.nasl
2008-01-17Name : Debian Security Advisory DSA 921-1 (kernel-source-2.4.27)
File : nvt/deb_921_1.nasl
2008-01-17Name : Debian Security Advisory DSA 922-1 (kernel-source-2.4.27)
File : nvt/deb_922_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
21279Linux Kernel Double Packet NAT Remote DoS

Nessus® Vulnerability Scanner

DateDescription
2013-03-09Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-219-1.nasl - Type : ACT_GATHER_INFO
2006-10-14Name : The remote Debian host is missing a security-related update.
File : debian_DSA-921.nasl - Type : ACT_GATHER_INFO
2006-10-14Name : The remote Debian host is missing a security-related update.
File : debian_DSA-922.nasl - Type : ACT_GATHER_INFO
2006-07-05Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2005-514.nasl - Type : ACT_GATHER_INFO
2006-07-03Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0140.nasl - Type : ACT_GATHER_INFO
2006-02-05Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0191.nasl - Type : ACT_GATHER_INFO
2006-01-20Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0140.nasl - Type : ACT_GATHER_INFO
2006-01-15Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2005-219.nasl - Type : ACT_GATHER_INFO
2005-10-11Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2005-514.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/15531
CONFIRM http://linux.bkbits.net:8080/linux-2.6/cset@42e14e05d0V1d88nZlaIX1F9dCRApA
DEBIAN http://www.debian.org/security/2005/dsa-921
http://www.debian.org/security/2005/dsa-922
FEDORA http://www.securityfocus.com/archive/1/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/428058/100/0/threaded
MANDRAKE http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
MANDRIVA http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
REDHAT http://www.redhat.com/support/errata/RHSA-2006-0140.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
SECUNIA http://secunia.com/advisories/17826
http://secunia.com/advisories/17918
http://secunia.com/advisories/18056
http://secunia.com/advisories/18059
http://secunia.com/advisories/18562
http://secunia.com/advisories/18684
http://secunia.com/advisories/18977
http://secunia.com/advisories/19185
http://secunia.com/advisories/19607
SGI ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
SUSE http://www.securityfocus.com/archive/1/archive/1/419522/100/0/threaded
UBUNTU http://www.ubuntulinux.org/support/documentation/usn/usn-219-1

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:33:13
  • Multiple Updates
2013-05-11 11:32:55
  • Multiple Updates