Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-4572 | First vendor Publication | 2006-11-06 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka "ip6_tables protocol bypass bug;" and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka "ip6_tables extension header bypass bug." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4572 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-03-23 | Name : Ubuntu Update for linux-source-2.6.12/2.6.15/2.6.17 vulnerabilities USN-416-1 File : nvt/gb_ubuntu_USN_416_1.nasl |
2009-03-23 | Name : Ubuntu Update for linux-restricted-modules-2.6.17 regression USN-416-2 File : nvt/gb_ubuntu_USN_416_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
30066 | Linux Kernel netfilter Fragmented IPv6 Packet Filtering Bypass |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-05-17 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-debug-2393.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_kernel-bigsmp-2399.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-395-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-416-1.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-416-2.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_kernel-2397.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-197.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:19:03 |
|
2024-11-28 12:09:56 |
|
2024-08-02 12:05:12 |
|
2024-08-02 01:02:01 |
|
2024-02-02 01:04:52 |
|
2024-02-01 12:02:01 |
|
2023-09-05 12:04:34 |
|
2023-09-05 01:01:53 |
|
2023-09-02 12:04:37 |
|
2023-09-02 01:01:53 |
|
2023-08-12 12:05:28 |
|
2023-08-12 01:01:53 |
|
2023-08-11 12:04:42 |
|
2023-08-11 01:01:56 |
|
2023-08-06 12:04:27 |
|
2023-08-06 01:01:54 |
|
2023-08-04 12:04:32 |
|
2023-08-04 01:01:56 |
|
2023-07-14 12:04:30 |
|
2023-07-14 01:01:55 |
|
2023-03-29 01:04:53 |
|
2023-03-28 12:02:00 |
|
2023-02-13 09:29:28 |
|
2022-10-11 12:03:59 |
|
2022-10-11 01:01:46 |
|
2022-03-11 01:03:32 |
|
2021-05-04 12:04:32 |
|
2021-04-22 01:05:11 |
|
2020-08-08 01:02:07 |
|
2020-07-30 01:02:11 |
|
2020-05-24 01:02:44 |
|
2020-05-23 00:18:21 |
|
2019-01-25 12:01:49 |
|
2018-10-30 12:01:57 |
|
2016-07-21 12:01:12 |
|
2016-06-28 23:53:40 |
|
2016-06-28 15:56:45 |
|
2016-04-26 15:02:32 |
|
2014-02-17 10:37:12 |
|
2013-05-11 11:08:34 |
|