CVE-2011-2189
Linux Kernel 2.6.35 - Network Namespace Remote Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
net / core / net_namespace.c en el kernel de Linux v2.6.32 y anteriores no maneja adecuadamente una alta tasa de creación y limpieza de los espacios de nombres de red, lo cual lo hace más fácil para los atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de peticiones a un demonio que requiere un espacio de nombres separados por conexión, como se demuestra por vsftpd.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-05-31 CVE Reserved
- 2011-09-19 CVE Published
- 2011-12-06 First Exploit
- 2023-10-29 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (15)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/36425 | 2011-12-06 | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373 | 2024-08-06 | |
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095 | 2024-08-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=711134 | 2024-08-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=711245 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://patchwork.ozlabs.org/patch/88217 | 2023-02-13 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2011/dsa-2305 | 2023-02-13 | |
http://www.ubuntu.com/usn/USN-1288-1 | 2023-02-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 2.6.32 Search vendor "Linux" for product "Linux Kernel" and version " <= 2.6.32" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 6.0 Search vendor "Redhat" for product "Enterprise Linux" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Mrg Search vendor "Redhat" for product "Enterprise Mrg" | 2.0 Search vendor "Redhat" for product "Enterprise Mrg" and version "2.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 11.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "11.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 11.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "11.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
|