Description
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1996-1 | New Linux 2.6.26 packages fix several vulnerabilities |
Debian DSA |
DSA-2003-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2009-4502 | drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. |
Ubuntu USN |
USN-894-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:08:37.954Z
Reserved: 2009-12-31T00:00:00.000Z
Link: CVE-2009-4536
No data.
Status : Modified
Published: 2010-01-12T17:30:00.697
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-4536
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN