Rapid7 Vulnerability & Exploit Database

CESA-2003:317: iproute security update

Back to Search

CESA-2003:317: iproute security update

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
12/15/2003
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated iproute packages that close a locally-exploitable denial of service vulnerability are now available.

The iproute package contains advanced IP routing and network device configuration tools. Herbert Xu reported that iproute can accept spoofed messages sent on the kernel netlink interface by other users on the local machine. This could lead to a local denial of service attack. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0856 to this issue. Users of iproute should upgrade to these erratum packages, which contain a patch that checks that netlink messages actually came from the kernel.

Solution(s)

  • centos-upgrade-iproute

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;