← Retour aux CVEs
CVE-2005-3272
N/ADescription
Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets.
Details CVE
Score CVSS v3.1N/A
Publie10/21/2005
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
linux:linux_kernel
References
http://secunia.com/advisories/18056(cve@mitre.org)
http://secunia.com/advisories/20237(cve@mitre.org)
http://secunia.com/advisories/21745(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(cve@mitre.org)
http://www.debian.org/security/2005/dsa-922(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(cve@mitre.org)
http://www.securityfocus.com/bid/15536(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10157(cve@mitre.org)
https://usn.ubuntu.com/219-1/(cve@mitre.org)
http://linux.bkbits.net:8080/linux-2.6/cset%40429a310bRFOXOmZvKaGXW8A5Qd9F1A(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18056(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20237(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21745(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-922(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15536(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10157(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/219-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.