CVE-2005-3848

N/A Unknown
Published: November 27, 2005 Modified: April 16, 2026
View on NVD

Description

Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://usn.ubuntu.com/231-1/
Source: cve@mitre.org
http://marc.info/?l=linux-kernel&m=112431016816937&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=linux-kernel&m=112439084918917&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=linux-kernel&m=112508479212728&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18203
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18510
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18562
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19038
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19369
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19374
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1017
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1018
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0101.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0140.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/16044
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/231-1/
Source: af854a3a-2127-422b-91ae-364da2661108

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.7%
91th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

linux