Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3688

Опубликовано: 09 окт. 2014
Источник: redhat
CVSS2: 7.1

Описание

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.

A flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled the association's output queue. A remote attacker could send specially crafted packets that would cause the system to use an excessive amount of memory, leading to a denial of service.

Отчет

This issue does affect Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG. Future Linux kernel updates for the respective releases will address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise MRG 2realtime-kernelAffected
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:199716.12.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2015:011503.02.2015
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2015:004313.01.2015
Red Hat Enterprise Linux 6.5 Extended Update SupportkernelFixedRHSA-2015:006220.01.2015
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:197109.12.2014

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1155745kernel: net: sctp: remote memory pressure from excessive queueing

7.1 High

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.

nvd
больше 10 лет назад

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.

debian
больше 10 лет назад

The SCTP implementation in the Linux kernel before 3.17.4 allows remot ...

suse-cvrf
почти 7 лет назад

Security update for the Linux Kernel

suse-cvrf
почти 7 лет назад

Security update for the Linux Kernel

7.1 High

CVSS2