// For flags

CVE-2010-4263

kernel: igb panics when receiving tag vlan packet

Severity Score

7.9
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel before 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote attackers to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via a VLAN tagged frame.

La función igb_receive_skb de drivers/net/igb/igb_main.c en el subsistema Intel Gigabit Ethernet (igb) del kernel de Linux en versiones anteriores a la 2.6.34, cuando la virtualización Single Root I/O (SR-IOV) y el modo promiscuo están habilitados pero ninguna VLANs está registrada, permite a atacantes remotos provocar una denegación de servicio (resolución de puntero a NULL y excepción) y posiblemente causar otros impactos a través de un frame etiquetado como VLAN.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-11-16 CVE Reserved
  • 2011-01-18 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
< 2.6.34
Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.34"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.0.0
Search vendor "Vmware" for product "Esx" and version "3.0.0"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.0.1
Search vendor "Vmware" for product "Esx" and version "3.0.1"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.0.2
Search vendor "Vmware" for product "Esx" and version "3.0.2"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.0.3
Search vendor "Vmware" for product "Esx" and version "3.0.3"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.5
Search vendor "Vmware" for product "Esx" and version "3.5"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.5
Search vendor "Vmware" for product "Esx" and version "3.5"
update1
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.5
Search vendor "Vmware" for product "Esx" and version "3.5"
update2
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
3.5
Search vendor "Vmware" for product "Esx" and version "3.5"
update3
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
4.0
Search vendor "Vmware" for product "Esx" and version "4.0"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
4.1
Search vendor "Vmware" for product "Esx" and version "4.1"
-
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
3.5
Search vendor "Vmware" for product "Esxi" and version "3.5"
-
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
3.5
Search vendor "Vmware" for product "Esxi" and version "3.5"
1
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.0
Search vendor "Vmware" for product "Esxi" and version "4.0"
-
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.0
Search vendor "Vmware" for product "Esxi" and version "4.0"
1
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.0
Search vendor "Vmware" for product "Esxi" and version "4.0"
2
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.0
Search vendor "Vmware" for product "Esxi" and version "4.0"
3
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.0
Search vendor "Vmware" for product "Esxi" and version "4.0"
4
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.1
Search vendor "Vmware" for product "Esxi" and version "4.1"
-
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.1
Search vendor "Vmware" for product "Esxi" and version "4.1"
1
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.1
Search vendor "Vmware" for product "Esxi" and version "4.1"
2
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
5.0
Search vendor "Vmware" for product "Esxi" and version "5.0"
-
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
5.0
Search vendor "Vmware" for product "Esxi" and version "5.0"
1
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
5.0
Search vendor "Vmware" for product "Esxi" and version "5.0"
2
Affected