Описание
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2004-2013
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16117
- http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html
- http://lists.netsys.com/pipermail/full-disclosure/2004-May/021223.html
- http://marc.info/?l=bugtraq&m=108456230815842&w=2
- http://www.securityfocus.com/bid/10326
Связанные уязвимости
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in ...