Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-3432

Опубликовано: 15 сент. 2010
Источник: redhat
CVSS2: 7.8
EPSS Низкий

Описание

The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.

Отчет

This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0958.html and https://rhn.redhat.com/errata/RHSA-2010-0842.html. Future updates in Red Hat Enterprise Linux 4 and 5 may address this flaw.

Меры по смягчению последствий

For users that do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file: blacklist sctp This way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.

Дополнительная информация

Статус:

Important
Дефект:
CWE-228->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=637675kernel: sctp: do not reset the packet during sctp_packet_config

EPSS

Процентиль: 88%
0.04322
Низкий

7.8 High

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.

nvd
больше 14 лет назад

The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.

debian
больше 14 лет назад

The sctp_packet_config function in net/sctp/output.c in the Linux kern ...

github
около 3 лет назад

The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.

oracle-oval
больше 14 лет назад

ELSA-2010-2011: Unbreakable enterprise kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 88%
0.04322
Низкий

7.8 High

CVSS2