Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-5209

Опубликовано: 29 авг. 2013
Источник: debian
EPSS Низкий

Описание

The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-8removedpackage
kfreebsd-8fixed8.3-6+deb7u1wheezypackage
kfreebsd-8end-of-lifesqueezepackage
kfreebsd-9fixed9.2~svn254368-2package
kfreebsd-10fixed10.0~svn254663-1package

EPSS

Процентиль: 70%
0.00626
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.

nvd
больше 12 лет назад

The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.

github
больше 3 лет назад

The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.

EPSS

Процентиль: 70%
0.00626
Низкий