← Back to CVEs
CVE-2005-3275
N/ADescription
The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
CVE Details
CVSS v3.1 ScoreN/A
Published10/21/2005
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
linux:linux_kernel
References
http://secunia.com/advisories/17826(cve@mitre.org)
http://secunia.com/advisories/17918(cve@mitre.org)
http://secunia.com/advisories/18056(cve@mitre.org)
http://secunia.com/advisories/18059(cve@mitre.org)
http://secunia.com/advisories/18562(cve@mitre.org)
http://secunia.com/advisories/18684(cve@mitre.org)
http://secunia.com/advisories/18977(cve@mitre.org)
http://secunia.com/advisories/19185(cve@mitre.org)
http://secunia.com/advisories/19607(cve@mitre.org)
http://www.debian.org/security/2005/dsa-921(cve@mitre.org)
http://www.debian.org/security/2005/dsa-922(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0140.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0190.html(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0191.html(cve@mitre.org)
http://www.securityfocus.com/archive/1/419522/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/427980/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/428028/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/428058/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/15531(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142(cve@mitre.org)
https://usn.ubuntu.com/219-1/(cve@mitre.org)
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U(af854a3a-2127-422b-91ae-364da2661108)
http://linux.bkbits.net:8080/linux-2.6/cset%4042e14e05d0V1d88nZlaIX1F9dCRApA(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17826(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17918(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18056(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18059(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18562(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18684(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18977(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19185(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19607(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-921(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-922(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0140.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0190.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0191.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/419522/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/427980/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/428028/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/428058/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15531(af854a3a-2127-422b-91ae-364da2661108)
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/219-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.