Description
The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
Published: 2005-10-20
Score: 2.6 Low
EPSS: 13.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-921-1 New Linux 2.4.27 packages fix several vulnerabilities
Debian DSA Debian DSA DSA-922-1 New Linux 2.6.8 packages fix several vulnerabilities
EUVD EUVD EUVD-2005-3274 The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
Ubuntu USN Ubuntu USN USN-219-1 Linux kernel vulnerabilities
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U cve-icon cve-icon
http://linux.bkbits.net:8080/linux-2.6/cset%4042e14e05d0V1d88nZlaIX1F9dCRApA cve-icon cve-icon
http://secunia.com/advisories/17826 cve-icon cve-icon
http://secunia.com/advisories/17918 cve-icon cve-icon
http://secunia.com/advisories/18056 cve-icon cve-icon
http://secunia.com/advisories/18059 cve-icon cve-icon
http://secunia.com/advisories/18562 cve-icon cve-icon
http://secunia.com/advisories/18684 cve-icon cve-icon
http://secunia.com/advisories/18977 cve-icon cve-icon
http://secunia.com/advisories/19185 cve-icon cve-icon
http://secunia.com/advisories/19607 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-921 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-922 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0140.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0190.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0191.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/419522/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/427980/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/428028/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/428058/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/15531 cve-icon cve-icon
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2005-3275 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142 cve-icon cve-icon
https://usn.ubuntu.com/219-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2005-3275 cve-icon
History

No history.

Subscriptions

Linux Linux Kernel
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T23:10:07.150Z

Reserved: 2005-10-20T00:00:00.000Z

Link: CVE-2005-3275

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2005-10-21T01:02:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2005-3275

cve-icon Redhat

Severity : Important

Publid Date: 2005-07-22T00:00:00Z

Links: CVE-2005-3275 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses