DescriptionThe tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
- SUSE-SA:2004:020, published Tuesday, Jul 2nd 2004 18:00 MEST
List of released packages
|Product(s)||Fixed package version(s)||References|
|SuSE Linux Desktop 1.0|| ||Builds|