Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-5077

Опубликовано: 17 июл. 2014
Источник: redhat
CVSS2: 7.1

Описание

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.

A NULL pointer dereference flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled simultaneous connections between the same hosts. A remote attacker could use this flaw to crash the system.

Отчет

This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 as it doesn't provide support for AUTH chunks. This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue. This issue has been fixed in Red Hat Enterprise MRG via RHSA-2014:1083.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:139213.10.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2014:176330.10.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:187218.11.2014
Red Hat Enterprise Linux 6.5 Extended Update SupportkernelFixedRHSA-2014:166823.10.2014
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:172428.10.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:108320.08.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1122982Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions

7.1 High

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.

nvd
около 11 лет назад

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.

debian
около 11 лет назад

The sctp_assoc_update function in net/sctp/associola.c in the Linux ke ...

github
больше 3 лет назад

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.

oracle-oval
почти 11 лет назад

ELSA-2014-1724: kernel security and bug fix update (IMPORTANT)

7.1 High

CVSS2