Описание
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
Ссылки
- Broken LinkExploitPatch
- Broken Link
- Mailing ListPatch
- Broken LinkThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Broken LinkExploitPatch
- Broken Link
- Mailing ListPatch
- Broken LinkThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 2.4.25 (включая)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
EPSS
Процентиль: 26%
0.00086
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-190
Связанные уязвимости
CVSS3: 7.8
debian
больше 20 лет назад
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in ...
CVSS3: 7.8
github
больше 3 лет назад
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
EPSS
Процентиль: 26%
0.00086
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-190