Description
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
Related CPE's
o
debian
debian_linux
o
netapp
fas_baseboard_management_controller_firmware
h
netapp
fas_baseboard_management_controller
References
https://bugzilla.redhat.com/show_bug.cgi?id=2014230
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://security.netapp.com/advisory/ntap-20220303-0002/
https://www.debian.org/security/2022/dsa-5096
https://www.oracle.com/security-alerts/cpujul2022.html
CVSS impact metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2022-02-18T18:15:09.013
3 years agoLast modified
2023-11-09T14:44:33.733
1 year ago