Description
nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fragments.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1289-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2007-1491 | nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fragments. |
Ubuntu USN |
USN-464-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T12:59:08.540Z
Reserved: 2007-03-16T00:00:00.000Z
Link: CVE-2007-1497
No data.
Status : Deferred
Published: 2007-03-16T22:19:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-1497
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN