CVE-2009-3613

Linux Kernel < 2.6.27.22 - Denial of Service via r8169 Driver Jumbo Frame Handling

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3613. PoCs published by Alistair Strachan.

AI-analyzed exploit summary This exploit leverages a vulnerability in the Linux kernel (prior to 2.6.26.4) by sending a malformed ping packet with a large size (-s 3000) and flood mode (-f), causing a local denial-of-service (kernel panic). The PoC is a simple command-line invocation of the ping utility.

Description

The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Alistair Strachan · textdoslinux
https://www.exploit-db.com/exploits/33289

This exploit leverages a vulnerability in the Linux kernel (prior to 2.6.26.4) by sending a malformed ping packet with a large size (-s 3000) and flood mode (-f), causing a local denial-of-service (kernel panic). The PoC is a simple command-line invocation of the ping utility.

Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target: Linux kernel < 2.6.26.4
No auth needed
Prerequisites: Local access to the target system · Ping utility available
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (19)

Core 19
Core References
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10209
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2009-1671.html
Exploit mailing-list x_refsource_mlist
http://marc.info/?l=oss-security&m=125561712529352&w=2
Vendor Advisory vendor-advisory x_refsource_redhat
https://rhn.redhat.com/errata/RHSA-2009-1540.html
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7377
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-864-1
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38794
Various Sources mailing-list x_refsource_mlist
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/37909
Vendor Advisory vendor-advisory x_refsource_redhat
https://rhn.redhat.com/errata/RHSA-2009-1548.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38834
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/36706
Issue Tracking x_refsource_confirm
http://bugzilla.kernel.org/show_bug.cgi?id=9468
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0528

Scores

EPSS 0.0565
EPSS Percentile 90.5%

Details

CWE
CWE-399
Status published
Products (50)
linux/linux_kernel 2.2.27
linux/linux_kernel 2.4.36
linux/linux_kernel 2.4.36.1
linux/linux_kernel 2.4.36.2
linux/linux_kernel 2.4.36.3
linux/linux_kernel 2.4.36.4
linux/linux_kernel 2.4.36.5
linux/linux_kernel 2.4.36.6
linux/linux_kernel 2.6
linux/linux_kernel 2.6.0
... and 40 more
Published Oct 19, 2009
Tracked Since Feb 18, 2026