CVE-2009-1385
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10
CVE, Inc., Red Hat
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
CVE, Inc., Red Hat
http://osvdb.org/54892
CVE, Inc., Red Hat
http://secunia.com/advisories/35265
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/35566
CVE, Inc., Red Hat
http://secunia.com/advisories/35623
CVE, Inc., Red Hat
http://secunia.com/advisories/35656
CVE, Inc., Red Hat
http://secunia.com/advisories/35847
CVE, Inc., Red Hat
http://secunia.com/advisories/36051
CVE, Inc., Red Hat
http://secunia.com/advisories/36131
CVE, Inc., Red Hat
http://secunia.com/advisories/36327
CVE, Inc., Red Hat
http://secunia.com/advisories/37471
CVE, Inc., Red Hat
http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302
CVE, Inc., Red Hat
Patch
http://wiki.rpath.com/Advisories:rPSA-2009-0111
CVE, Inc., Red Hat
http://www.debian.org/security/2009/dsa-1844
CVE, Inc., Red Hat
http://www.debian.org/security/2009/dsa-1865
CVE, Inc., Red Hat
http://www.intel.com/support/network/sb/CS-030543.htm
CVE, Inc., Red Hat
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8
CVE, Inc., Red Hat
Patch
Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
CVE, Inc., Red Hat
http://www.openwall.com/lists/oss-security/2009/06/03/2
CVE, Inc., Red Hat
http://www.redhat.com/support/errata/RHSA-2009-1157.html
CVE, Inc., Red Hat
http://www.redhat.com/support/errata/RHSA-2009-1193.html
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/505254/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/507985/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/512019/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/35185
CVE, Inc., Red Hat
http://www.ubuntu.com/usn/usn-793-1
CVE, Inc., Red Hat
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2009/3316
CVE, Inc., Red Hat
https://bugzilla.redhat.com/show_bug.cgi?id=502981
CVE, Inc., Red Hat
Exploit
Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
CVE, Inc., Red Hat
https://rhn.redhat.com/errata/RHSA-2009-1550.html
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-189
Numeric Errors
NIST  
Change History
7 change records found show changes
CVE Modified by CVE 11/20/2024 8:02:21 PM
Action
Type
Old Value
New Value
Added
Reference
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
Added
Reference
http://osvdb.org/54892
Added
Reference
http://secunia.com/advisories/35265
Added
Reference
http://secunia.com/advisories/35566
Added
Reference
http://secunia.com/advisories/35623
Added
Reference
http://secunia.com/advisories/35656
Added
Reference
http://secunia.com/advisories/35847
Added
Reference
http://secunia.com/advisories/36051
Added
Reference
http://secunia.com/advisories/36131
Added
Reference
http://secunia.com/advisories/36327
Added
Reference
http://secunia.com/advisories/37471
Added
Reference
http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302
Added
Reference
http://wiki.rpath.com/Advisories:rPSA-2009-0111
Added
Reference
http://www.debian.org/security/2009/dsa-1844
Added
Reference
http://www.debian.org/security/2009/dsa-1865
Added
Reference
http://www.intel.com/support/network/sb/CS-030543.htm
Added
Reference
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
Added
Reference
http://www.openwall.com/lists/oss-security/2009/06/03/2
Added
Reference
http://www.redhat.com/support/errata/RHSA-2009-1157.html
Added
Reference
http://www.redhat.com/support/errata/RHSA-2009-1193.html
Added
Reference
http://www.securityfocus.com/archive/1/505254/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/512019/100/0/threaded
Added
Reference
http://www.securityfocus.com/bid/35185
Added
Reference
http://www.ubuntu.com/usn/usn-793-1
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Added
Reference
http://www.vupen.com/english/advisories/2009/3316
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=502981
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
Added
Reference
https://rhn.redhat.com/errata/RHSA-2009-1550.html
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
CVE Modified by Red Hat, Inc. 5/13/2024 10:06:11 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 2/12/2023 9:20:10 PM
Action
Type
Old Value
New Value
Changed
Description
CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
Removed
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:N/I:N/A:C)
Removed
Reference
https://access.redhat.com/errata/RHSA-2009:1132 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2009:1157 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2009:1193 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2009:1550 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2010:0079 [No Types Assigned]
Removed
Reference
https://access.redhat.com/security/cve/CVE-2009-1385 [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/02/2023 9:15:16 AM
Action
Type
Old Value
New Value
Changed
Description
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
Added
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:N/I:N/A:C)
Added
Reference
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2009:1132 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2009:1157 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2009:1193 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2009:1550 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2010:0079 [No Types Assigned]
Added
Reference
https://access.redhat.com/security/cve/CVE-2009-1385 [No Types Assigned]
Removed
Reference
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea30e11970a96cfe5e32c03a29332554573b4a10 [Vendor Advisory]
CVE Modified by Red Hat, Inc. 10/10/2018 3:36:23 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/505254/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/507985/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/512019/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/505254/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/512019/100/0/threaded [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/28/2017 9:34:21 PM
Action
Type
Old Value
New Value
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598 [No Types Assigned]
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681 [No Types Assigned]
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11598 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11681 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8340 [No Types Assigned]
Initial CVE Analysis 6/04/2009 1:45:00 PM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2009-1385 NVD
Published Date: 06/04/2009 NVD
Last Modified: 04/08/2025
Source: Red Hat, Inc.