Lucene search

K
openvasCopyright (C) 2008 Greenbone AGOPENVAS:1361412562310800036
HistoryOct 22, 2008 - 12:00 a.m.

Linux Kernel Stream Control Transmission Protocol Violation Vulnerability

2008-10-2200:00:00
Copyright (C) 2008 Greenbone AG
plugins.openvas.org
10

6.3 Medium

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.002 Low

EPSS

Percentile

58.5%

This host has Linux Kernel Stream Control Transmission Protocol
(SCTP) implementation and is prone to Protocol Violation Vulnerability.

# SPDX-FileCopyrightText: 2008 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.800036");
  script_version("2023-06-27T05:05:30+0000");
  script_tag(name:"last_modification", value:"2023-06-27 05:05:30 +0000 (Tue, 27 Jun 2023)");
  script_tag(name:"creation_date", value:"2008-10-22 15:17:54 +0200 (Wed, 22 Oct 2008)");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_cve_id("CVE-2008-4618");
  script_name("Linux Kernel Stream Control Transmission Protocol Violation Vulnerability");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 Greenbone AG");
  script_family("Denial of Service");

  script_xref(name:"URL", value:"http://www.openwall.com/lists/oss-security/2008/10/06/1");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/31848");
  script_xref(name:"URL", value:"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27");
  script_xref(name:"URL", value:"http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=ba0166708ef4da7eeb61dd92bbba4d5a749d6561");

  script_tag(name:"impact", value:"Successful attacks will result in denial of service via kernel related
  vectors.");

  script_tag(name:"affected", value:"Linux kernel version before 2.6.27 on all Linux Platforms.");

  script_tag(name:"insight", value:"The issue is with the parameter 'sctp_paramhdr' in sctp_sf_violation_paramlen,
  sctp_sf_abort_violation, and sctp_make_abort_violation functions of sm.h,
  sm_make_chunk.c, and sm_statefunc.c files, which has invalid length and
  incorrect data types in function calls.");

  script_tag(name:"summary", value:"This host has Linux Kernel Stream Control Transmission Protocol
  (SCTP) implementation and is prone to Protocol Violation Vulnerability.");

  script_tag(name:"solution", value:"Upgrade to Linux kernel 2.6.27, or
  apply the available patch from the referenced link.");

  script_tag(name:"deprecated", value:TRUE); # Covered by various LSCs and doesn't have much relevance these days...

  script_tag(name:"qod_type", value:"executable_version_unreliable");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

exit(66);

6.3 Medium

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.002 Low

EPSS

Percentile

58.5%