#VU95220 Resource management errors in Linux kernel - CVE-2007-1861


| Updated: 2024-08-02

Vulnerability identifier: #VU95220

Vulnerability risk: Low

CVSSv4.0: 5.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2007-1861

CWE-ID: CWE-399

Exploitation vector: Local

Exploit availability: Yes

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The nl_fib_lookup function in net/ipv4/fib_frontend.c in Linux Kernel before 2.6.20.8 allows attackers to cause a denial of service (kernel panic) via NETLINK_FIB_LOOKUP replies, which trigger infinite recursion and a stack overflow.

Mitigation
Install update from vendor's repository.

Vulnerable software versions

Linux kernel: All versions


External links
https://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.8
https://secunia.com/advisories/25030
https://secunia.com/advisories/25083
https://secunia.com/advisories/25228
https://secunia.com/advisories/25288
https://secunia.com/advisories/25691
https://secunia.com/advisories/25961
https://secunia.com/advisories/26133
https://secunia.com/advisories/26139
https://secunia.com/advisories/26620
https://www.debian.org/security/2007/dsa-1289
https://www.mandriva.com/security/advisories?name=MDKSA-2007:171
https://www.novell.com/linux/security/advisories/2007_43_kernel.html
https://www.redhat.com/support/errata/RHSA-2007-0347.html
https://www.securityfocus.com/archive/1/467939/30/6690/threaded
https://www.securityfocus.com/archive/1/471457
https://www.securityfocus.com/bid/23677
https://www.ubuntu.com/usn/usn-486-1
https://www.ubuntu.com/usn/usn-489-1
https://www.vupen.com/english/advisories/2007/1595
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=237913
https://exchange.xforce.ibmcloud.com/vulnerabilities/34014
https://issues.rpath.com/browse/RPL-1309
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11616


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability