Linux Kernel Multiple IPV6 Packet Filtering Bypass Vulnerabilities

An attacker can exploit these issues by sending specially crafted fragments. The attacker could employ readily available packet-creation utilities to build the fragmented packets.


 

Privacy Statement
Copyright 2010, SecurityFocus