// For flags

CVE-2008-2136

kernel: sit memory leak

Severity Score

7.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.

Fugas de memoria en la función ip6_rcv de net/ipv6/sit.c en el núcleo de Linux versiones anteriores a 2.6.25.3 permite a atacantes remotos provocar una denegación de servicio (consumo excesivo de memoria) a través de tráfico de red de una interfaz de túnel Simple Internet Transition (SIT), relacionado a las funciones pskb_may_pull y kfree_skb, y la gestión de una cuenta de referencia skb.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-05-12 CVE Reserved
  • 2008-05-16 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
  • CWE-401: Missing Release of Memory after Effective Lifetime
CAPEC
References (41)
URL Tag Source
http://marc.info/?l=linux-netdev&m=121031533024912&w=2 Mailing List
http://secunia.com/advisories/30198 Third Party Advisory
http://secunia.com/advisories/30241 Third Party Advisory
http://secunia.com/advisories/30276 Third Party Advisory
http://secunia.com/advisories/30368 Third Party Advisory
http://secunia.com/advisories/30499 Third Party Advisory
http://secunia.com/advisories/30818 Third Party Advisory
http://secunia.com/advisories/30962 Third Party Advisory
http://secunia.com/advisories/31107 Third Party Advisory
http://secunia.com/advisories/31198 Third Party Advisory
http://secunia.com/advisories/31341 Third Party Advisory
http://secunia.com/advisories/31628 Third Party Advisory
http://secunia.com/advisories/31689 Third Party Advisory
http://secunia.com/advisories/33201 Third Party Advisory
http://secunia.com/advisories/33280 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-362.htm Third Party Advisory
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169 Broken Link
http://www.securityfocus.com/bid/29235 Third Party Advisory
http://www.securitytracker.com/id?1020118 Third Party Advisory
http://www.vupen.com/english/advisories/2008/1543/references Third Party Advisory
http://www.vupen.com/english/advisories/2008/1716/references Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/42451 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11038 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6503 Broken Link
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.4.0 < 2.4.36.5
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.4.0 < 2.4.36.5"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.0 < 2.6.25.3
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.0 < 2.6.25.3"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
4.0
Search vendor "Debian" for product "Debian Linux" and version "4.0"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.06
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
8.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04"
lts
Affected