CVE-2012-6638

Impact:
Moderate
Public Date:
2011-12-02
Bugzilla:
1066055: CVE-2012-6638 Kernel: net: tcp: potential DoS via SYN+FIN messages

The MITRE CVE dictionary describes this issue as:

The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a different vulnerability than CVE-2012-2663.

Find out more about CVE-2012-6638 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.

CVSS v2 metrics

Base Score 6.4
Base Metrics AV:N/AC:L/Au:N/C:P/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (kernel) RHSA-2014:0433 2014-04-24
Red Hat Enterprise Linux EUS (v. 5.9 server) (kernel) RHSA-2014:0772 2014-06-19

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Not affected
Red Hat Enterprise Linux 7 kernel Not affected
Red Hat Enterprise Linux 6 kernel Not affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.