Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-4618

Опубликовано: 21 окт. 2008
Источник: debian
EPSS Низкий

Описание

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.26-10package
linux-2.6not-affectedetchpackage
linux-2.6.24fixed2.6.24-6~etchnhalf.7package

Примечания

  • ba0166708ef4da7eeb61dd92bbba4d5a749d6561

EPSS

Процентиль: 76%
0.01011
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

redhat
почти 17 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

nvd
почти 17 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

github
больше 3 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

fstec
больше 10 лет назад

Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 76%
0.01011
Низкий