drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1996-1 | New Linux 2.6.26 packages fix several vulnerabilities |
![]() |
DSA-2003-1 | New Linux 2.6.18 packages fix several vulnerabilities |
![]() |
EUVD-2009-4502 | drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. |
![]() |
USN-894-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:08:37.954Z
Reserved: 2009-12-31T00:00:00
Link: CVE-2009-4536

No data.

Status : Deferred
Published: 2010-01-12T17:30:00.697
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-4536


No data.