Lucene search

K
f5F5F5:K15317
HistoryMar 04, 2015 - 12:00 a.m.

K15317 : Linux kernel vulnerability CVE-2014-0101

2015-03-0400:00:00
my.f5.com
15

6.8 Medium

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.918 High

EPSS

Percentile

98.7%

Security Advisory Description

The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. (CVE-2014-0101)
Impact
Remote attackers may be able to cause a denial-of-service (DoS) using a crafted SCTP handshake.

Note: The BIG-IP/BIG-IQ/Enterprise Manager software contains vulnerable code (SCTP kernel module), but the code is not enabled by default. Before a remote attacker can exploit this vulnerability, a locally authenticated administrative user must load the vulnerable SCTP kernel module, create a listener (such as self IP) on the control plane, and allow SCTP traffic on this listener. Because of the specific conditions required for exploit, F5 Product Development considers affected BIG-IP/BIG-IQ/Enterprise Manager systems as not vulnerable in a standard configuration, and severely vulnerable if the described conditions are met.

6.8 Medium

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.918 High

EPSS

Percentile

98.7%