Security restrictions bypass in Linux kernel - CVE-2006-4572

 

Security restrictions bypass in Linux kernel - CVE-2006-4572

Published: November 7, 2006 / Updated: February 13, 2023


Vulnerability identifier: #VU92873
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2006-4572
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka 'ip6_tables protocol bypass bug;' and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka 'ip6_tables extension header bypass bug.'


How to mitigate CVE-2006-4572

Install update from vendor's repository.

Sources