Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-2523

Опубликовано: 06 янв. 2014
Источник: redhat
CVSS2: 7.6
EPSS Низкий

Описание

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

Отчет

This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:047507.05.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2014:052020.05.2014
Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node OnlykernelFixedRHSA-2014:059303.06.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:063404.06.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:043928.04.2014

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1077343kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages

EPSS

Процентиль: 87%
0.03555
Низкий

7.6 High

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

nvd
больше 11 лет назад

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

debian
больше 11 лет назад

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3. ...

github
больше 3 лет назад

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

oracle-oval
больше 11 лет назад

ELSA-2014-3016: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 87%
0.03555
Низкий

7.6 High

CVSS2