CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
98.9%
Issue Overview:
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.
Affected Packages:
kernel
Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.
New Packages:
i686:
kernel-headers-3.10.34-37.137.amzn1.i686
kernel-debuginfo-3.10.34-37.137.amzn1.i686
perf-debuginfo-3.10.34-37.137.amzn1.i686
perf-3.10.34-37.137.amzn1.i686
kernel-devel-3.10.34-37.137.amzn1.i686
kernel-3.10.34-37.137.amzn1.i686
kernel-debuginfo-common-i686-3.10.34-37.137.amzn1.i686
noarch:
kernel-doc-3.10.34-37.137.amzn1.noarch
src:
kernel-3.10.34-37.137.amzn1.src
x86_64:
kernel-headers-3.10.34-37.137.amzn1.x86_64
kernel-debuginfo-3.10.34-37.137.amzn1.x86_64
kernel-debuginfo-common-x86_64-3.10.34-37.137.amzn1.x86_64
perf-3.10.34-37.137.amzn1.x86_64
perf-debuginfo-3.10.34-37.137.amzn1.x86_64
kernel-3.10.34-37.137.amzn1.x86_64
kernel-devel-3.10.34-37.137.amzn1.x86_64
Red Hat: CVE-2014-0101
Mitre: CVE-2014-0101