CVE-2009-1385 : Detail

CVE-2009-1385

11.97%V4
Network
2009-06-04
14h00 +00:00
2018-10-10
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-189 Category : Numeric Errors
Weaknesses in this category are related to improper calculation or conversion of numbers.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.8 AV:N/AC:L/Au:N/C:N/I:N/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Intel>>E1000 >> Version To (including) 7.4.35

Intel>>E1000 >> Version 5.2.22

Intel>>E1000 >> Version 5.2.30.1

Intel>>E1000 >> Version 5.2.52

Intel>>E1000 >> Version 5.3.19

Intel>>E1000 >> Version 5.4.11

Intel>>E1000 >> Version 5.5.4

Intel>>E1000 >> Version 5.6.10

Intel>>E1000 >> Version 5.6.10.1

Intel>>E1000 >> Version 5.7.6

Intel>>E1000 >> Version 6.0.54

Intel>>E1000 >> Version 6.0.60

Intel>>E1000 >> Version 6.1.16

Intel>>E1000 >> Version 6.2.15

Intel>>E1000 >> Version 6.3.9

Intel>>E1000 >> Version 7.0.33

Intel>>E1000 >> Version 7.0.41

Intel>>E1000 >> Version 7.1.9

Intel>>E1000 >> Version 7.2.7

Intel>>E1000 >> Version 7.2.9

Intel>>E1000 >> Version 7.3.15

Intel>>E1000 >> Version 7.3.20

Intel>>E1000 >> Version 7.4.27

Linux>>Kernel >> Version 2.6.24.7

Linux>>Kernel >> Version 2.6.25.15

Linux>>Linux_kernel >> Version To (including) 2.6.28

Linux>>Linux_kernel >> Version To (including) 2.6.30

Linux>>Linux_kernel >> Version 2.2.27

Linux>>Linux_kernel >> Version 2.4.36

Linux>>Linux_kernel >> Version 2.4.36.1

Linux>>Linux_kernel >> Version 2.4.36.2

Linux>>Linux_kernel >> Version 2.4.36.3

Linux>>Linux_kernel >> Version 2.4.36.4

Linux>>Linux_kernel >> Version 2.4.36.5

Linux>>Linux_kernel >> Version 2.4.36.6

Linux>>Linux_kernel >> Version 2.6

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.18

Linux>>Linux_kernel >> Version 2.6.19.4

Linux>>Linux_kernel >> Version 2.6.19.5

Linux>>Linux_kernel >> Version 2.6.19.6

Linux>>Linux_kernel >> Version 2.6.19.7

Linux>>Linux_kernel >> Version 2.6.20.16

Linux>>Linux_kernel >> Version 2.6.20.17

Linux>>Linux_kernel >> Version 2.6.20.18

Linux>>Linux_kernel >> Version 2.6.20.19

Linux>>Linux_kernel >> Version 2.6.20.20

Linux>>Linux_kernel >> Version 2.6.20.21

Linux>>Linux_kernel >> Version 2.6.21.5

Linux>>Linux_kernel >> Version 2.6.21.6

Linux>>Linux_kernel >> Version 2.6.21.7

Linux>>Linux_kernel >> Version 2.6.22

Linux>>Linux_kernel >> Version 2.6.22.1

Linux>>Linux_kernel >> Version 2.6.22.2

Linux>>Linux_kernel >> Version 2.6.22.8

Linux>>Linux_kernel >> Version 2.6.22.9

Linux>>Linux_kernel >> Version 2.6.22.10

Linux>>Linux_kernel >> Version 2.6.22.11

Linux>>Linux_kernel >> Version 2.6.22.12

Linux>>Linux_kernel >> Version 2.6.22.13

Linux>>Linux_kernel >> Version 2.6.22.14

Linux>>Linux_kernel >> Version 2.6.22.15

Linux>>Linux_kernel >> Version 2.6.22.17

Linux>>Linux_kernel >> Version 2.6.22.18

Linux>>Linux_kernel >> Version 2.6.22.19

Linux>>Linux_kernel >> Version 2.6.22.20

Linux>>Linux_kernel >> Version 2.6.22.21

Linux>>Linux_kernel >> Version 2.6.22.22

Linux>>Linux_kernel >> Version 2.6.22_rc1

Linux>>Linux_kernel >> Version 2.6.22_rc7

Linux>>Linux_kernel >> Version 2.6.23

Linux>>Linux_kernel >> Version 2.6.23.8

Linux>>Linux_kernel >> Version 2.6.23.9

Linux>>Linux_kernel >> Version 2.6.23.10

Linux>>Linux_kernel >> Version 2.6.23.11

Linux>>Linux_kernel >> Version 2.6.23.12

Linux>>Linux_kernel >> Version 2.6.23.13

Linux>>Linux_kernel >> Version 2.6.23.15

Linux>>Linux_kernel >> Version 2.6.23.16

Linux>>Linux_kernel >> Version 2.6.23.17

Linux>>Linux_kernel >> Version 2.6.23_rc1

Linux>>Linux_kernel >> Version 2.6.24

Linux>>Linux_kernel >> Version 2.6.24.1

Linux>>Linux_kernel >> Version 2.6.24.2

Linux>>Linux_kernel >> Version 2.6.24.3

Linux>>Linux_kernel >> Version 2.6.24.4

Linux>>Linux_kernel >> Version 2.6.24.5

Linux>>Linux_kernel >> Version 2.6.24.6

Linux>>Linux_kernel >> Version 2.6.24_rc1

Linux>>Linux_kernel >> Version 2.6.24_rc4

Linux>>Linux_kernel >> Version 2.6.24_rc5

Linux>>Linux_kernel >> Version 2.6.25

Linux>>Linux_kernel >> Version 2.6.25

Linux>>Linux_kernel >> Version 2.6.25.1

Linux>>Linux_kernel >> Version 2.6.25.1

Linux>>Linux_kernel >> Version 2.6.25.2

Linux>>Linux_kernel >> Version 2.6.25.2

Linux>>Linux_kernel >> Version 2.6.25.3

Linux>>Linux_kernel >> Version 2.6.25.3

Linux>>Linux_kernel >> Version 2.6.25.4

Linux>>Linux_kernel >> Version 2.6.25.4

Linux>>Linux_kernel >> Version 2.6.25.5

Linux>>Linux_kernel >> Version 2.6.25.5

Linux>>Linux_kernel >> Version 2.6.25.6

Linux>>Linux_kernel >> Version 2.6.25.6

Linux>>Linux_kernel >> Version 2.6.25.7

Linux>>Linux_kernel >> Version 2.6.25.7

Linux>>Linux_kernel >> Version 2.6.25.8

Linux>>Linux_kernel >> Version 2.6.25.8

Linux>>Linux_kernel >> Version 2.6.25.9

Linux>>Linux_kernel >> Version 2.6.25.9

Linux>>Linux_kernel >> Version 2.6.25.10

Linux>>Linux_kernel >> Version 2.6.25.10

Linux>>Linux_kernel >> Version 2.6.25.11

Linux>>Linux_kernel >> Version 2.6.25.11

Linux>>Linux_kernel >> Version 2.6.25.12

Linux>>Linux_kernel >> Version 2.6.25.12

Linux>>Linux_kernel >> Version 2.6.25.13

Linux>>Linux_kernel >> Version 2.6.25.14

Linux>>Linux_kernel >> Version 2.6.25.16

Linux>>Linux_kernel >> Version 2.6.25.17

Linux>>Linux_kernel >> Version 2.6.26

Linux>>Linux_kernel >> Version 2.6.26.1

Linux>>Linux_kernel >> Version 2.6.26.2

Linux>>Linux_kernel >> Version 2.6.26.3

Linux>>Linux_kernel >> Version 2.6.26.4

Linux>>Linux_kernel >> Version 2.6.26.5

Linux>>Linux_kernel >> Version 2.6.27

Linux>>Linux_kernel >> Version 2.6.29

Linux>>Linux_kernel >> Version 2.6.29

Linux>>Linux_kernel >> Version 2.6.29

Linux>>Linux_kernel >> Version 2.6.29

Linux>>Linux_kernel >> Version 2.6.29

Linux>>Linux_kernel >> Version 2.6.29

Linux>>Linux_kernel >> Version 2.6.29.3

Linux>>Linux_kernel >> Version 2.6.29.rc1

Linux>>Linux_kernel >> Version 2.6.29.rc2

Linux>>Linux_kernel >> Version 2.6.29.rc2-git1

Linux>>Linux_kernel >> Version 2.6.30

Linux>>Linux_kernel >> Version 2.6.30

Linux>>Linux_kernel >> Version 2.6.30

References

http://secunia.com/advisories/35265
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.debian.org/security/2009/dsa-1865
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/36131
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/37471
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/35656
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2009/dsa-1844
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.redhat.com/support/errata/RHSA-2009-1193.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/35566
Tags : third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/54892
Tags : vdb-entry, x_refsource_OSVDB
http://www.redhat.com/support/errata/RHSA-2009-1157.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/35185
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/35623
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/36051
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/36327
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-793-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.openwall.com/lists/oss-security/2009/06/03/2
Tags : mailing-list, x_refsource_MLIST
https://rhn.redhat.com/errata/RHSA-2009-1550.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2009/3316
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/35847
Tags : third-party-advisory, x_refsource_SECUNIA