CVE-2009-4538
kernel: e1000e frame fragment issue
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
drivers/net/e1000e/netdev.c en el driver e1000e en el kernel de Linux v2.6.32.3 y anteriores no comprueba adecuadamente el tamaño de una trama Ethernet que excede el MTU, lo que permite a atacantes remotos conseguir un impacto desconocido a través de paquetes manipulados, un hecho relacionado con CVE-2009-4537.
Various kernel related vulnerabilities have been addressed. It was discovered that FUSE did not correctly check certain requests. It was discovered that KVM did not correctly decode certain guest instructions. It was discovered that the OHCI fireware driver did not correctly handle certain ioctls. It was discovered that "print-fatal-signals" reporting could show arbitrary kernel memory contents.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-12-31 CVE Reserved
- 2010-01-12 CVE Published
- 2024-08-07 CVE Updated
- 2025-05-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (31)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/38031 | Third Party Advisory | |
http://secunia.com/advisories/38276 | Third Party Advisory | |
http://secunia.com/advisories/38296 | Third Party Advisory | |
http://secunia.com/advisories/38492 | Third Party Advisory | |
http://secunia.com/advisories/38610 | Third Party Advisory | |
http://secunia.com/advisories/38779 | Third Party Advisory | |
http://securitytracker.com/id?1023420 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2009/12/28/1 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2009/12/29/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2009/12/31/1 | Mailing List |
|
http://www.securityfocus.com/bid/37523 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55645 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7016 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9702 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 2.6.32.3 Search vendor "Linux" for product "Linux Kernel" and version " <= 2.6.32.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|