Rule

--
Sid
17738

--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in linux kernel.

--
Impact:
Denial of Service.   

--
Detailed Information:
The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.

--
Affected Systems:
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.0
linux linux kernel 2.6.1
linux linux kernel 2.6.1
linux linux kernel 2.6.1
linux linux kernel 2.6.10
linux linux kernel 2.6.10
linux linux kernel 2.6.10
linux linux kernel 2.6.11
linux linux kernel 2.6.11
linux linux kernel 2.6.11
linux linux kernel 2.6.11
linux linux kernel 2.6.11
linux linux kernel 2.6.11
linux linux kernel 2.6.11
linux linux kernel 2.6.11.1
linux linux kernel 2.6.11.10
linux linux kernel 2.6.11.11
linux linux kernel 2.6.11.12
linux linux kernel 2.6.11.2
linux linux kernel 2.6.11.3
linux linux kernel 2.6.11.4
linux linux kernel 2.6.11.5
linux linux kernel 2.6.11.6
linux linux kernel 2.6.11.7
linux linux kernel 2.6.11.8
linux linux kernel 2.6.11.9
linux linux kernel 2.6.11 rc1 bk6
linux linux kernel 2.6.12
linux linux kernel 2.6.12
linux linux kernel 2.6.12
linux linux kernel 2.6.12
linux linux kernel 2.6.12
linux linux kernel 2.6.12
linux linux kernel 2.6.12.1
linux linux kernel 2.6.12.2
linux linux kernel 2.6.12.3
linux linux kernel 2.6.12.4
linux linux kernel 2.6.12.5
linux linux kernel 2.6.12.6
linux linux kernel 2.6.13
linux linux kernel 2.6.13
linux linux kernel 2.6.13
linux linux kernel 2.6.13
linux linux kernel 2.6.13
linux linux kernel 2.6.13
linux linux kernel 2.6.13
linux linux kernel 2.6.13.1
linux linux kernel 2.6.13.2
linux linux kernel 2.6.13.3
linux linux kernel 2.6.13.4
linux linux kernel 2.6.14
linux linux kernel 2.6.14
linux linux kernel 2.6.14
linux linux kernel 2.6.14
linux linux kernel 2.6.14
linux linux kernel 2.6.14.1
linux linux kernel 2.6.14.2
linux linux kernel 2.6.14.3
linux linux kernel 2.6.14.4
linux linux kernel 2.6.14.5
linux linux kernel 2.6.14.6
linux linux kernel 2.6.14.7
linux linux kernel 2.6.15
linux linux kernel 2.6.15
linux linux kernel 2.6.15
linux linux kernel 2.6.15
linux linux kernel 2.6.15
linux linux kernel 2.6.15
linux linux kernel 2.6.15.1
linux linux kernel 2.6.15.2
linux linux kernel 2.6.15.3
linux linux kernel 2.6.15.4
linux linux kernel 2.6.15.5
linux linux kernel 2.6.15.6
linux linux kernel 2.6.15.7
linux linux kernel 2.6.16
linux linux kernel 2.6.16
linux linux kernel 2.6.16
linux linux kernel 2.6.16
linux linux kernel 2.6.16
linux linux kernel 2.6.16
linux linux kernel 2.6.16.1
linux linux kernel 2.6.16.10
linux linux kernel 2.6.16.11
linux linux kernel 2.6.16.12
linux linux kernel 2.6.16.13
linux linux kernel 2.6.16.14
linux linux kernel 2.6.16.15
linux linux kernel 2.6.16.16
linux linux kernel 2.6.16.2
linux linux kernel 2.6.16.3
linux linux kernel 2.6.16.4
linux linux kernel 2.6.16.5
linux linux kernel 2.6.16.6
linux linux kernel 2.6.16.7
linux linux kernel 2.6.16.8
linux linux kernel 2.6.16.9
linux linux kernel 2.6.16 rc7
linux linux kernel 2.6.2
linux linux kernel 2.6.2
linux linux kernel 2.6.2
linux linux kernel 2.6.3
linux linux kernel 2.6.3
linux linux kernel 2.6.3
linux linux kernel 2.6.3
linux linux kernel 2.6.4
linux linux kernel 2.6.4
linux linux kernel 2.6.4
linux linux kernel 2.6.5
linux linux kernel 2.6.5
linux linux kernel 2.6.5
linux linux kernel 2.6.6
linux linux kernel 2.6.6
linux linux kernel 2.6.6
linux linux kernel 2.6.7
linux linux kernel 2.6.7
linux linux kernel 2.6.7
linux linux kernel 2.6.8
linux linux kernel 2.6.8
linux linux kernel 2.6.8
linux linux kernel 2.6.8
linux linux kernel 2.6.8.1
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.8.1.5
linux linux kernel 2.6.9
linux linux kernel 2.6.9
linux linux kernel 2.6.9
linux linux kernel 2.6.9
linux linux kernel 2.6.9
linux linux kernel 2.6.9
linux linux kernel 2.6 test9 cvs

--
Attack Scenarios:


--
Ease of Attack:
Medium.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Vulnerability Research Team
This document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.
For more information see http://nvd.nist.gov/

--
Additional References:

NIST CVE-2006-2444:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2444
  
--
