6.8 Medium
AI Score
Confidence
Low
8.3 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
0.006 Low
EPSS
Percentile
78.8%
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 10.10 | |
ubuntu_linux | eq | 9.04 | |
ubuntu_linux | eq | 9.10 | |
ubuntu_linux | eq | 8.04 | |
ubuntu_linux | eq | 10.04 | |
ubuntu_linux | eq | 6.06 | |
debian_linux | eq | 5.0 | |
fedora | eq | 13 | |
linux_kernel | lt | 2.6.36 |
git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=51e97a12bef19b7e43199fc153cf9bd5f2140362
secunia.com/advisories/42745
www.debian.org/security/2010/dsa-2126
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
www.mandriva.com/security/advisories?name=MDVSA-2011:029
www.openwall.com/lists/oss-security/2010/10/04/2
www.openwall.com/lists/oss-security/2010/10/04/7
www.redhat.com/support/errata/RHSA-2010-0842.html
www.redhat.com/support/errata/RHSA-2010-0958.html
www.ubuntu.com/usn/USN-1000-1
www.vupen.com/english/advisories/2010/3321
bugzilla.redhat.com/show_bug.cgi?id=640036
lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
marc.info/?l=linux-kernel&m=128596992418814&w=2