Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-2826

Опубликовано: 21 июн. 2008
Источник: redhat
EPSS Низкий

Описание

Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=452478kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow

EPSS

Процентиль: 25%
0.00082
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.

nvd
больше 17 лет назад

Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.

debian
больше 17 лет назад

Integer overflow in the sctp_getsockopt_local_addrs_old function in ne ...

github
больше 3 лет назад

Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.

EPSS

Процентиль: 25%
0.00082
Низкий