Linux kernel IPv6 implementation vulnerable to denial of service attack via raw sockets
CVE-2023-52340
7.5HIGH
Summary
A vulnerability exists within the IPv6 implementation of the Linux kernel prior to version 6.3, specifically related to the max_size threshold in net/ipv6/route.c. This issue can be exploited to induce a denial of service condition, resulting in persistent unreachable network errors when IPv6 packets are sent in a loop using a raw socket. Proper mitigation efforts are required to prevent potential service disruptions for affected systems.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database