Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-7841

Опубликовано: 10 нояб. 2014
Источник: redhat
CVSS2: 7.1

Описание

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

A flaw was found in the way the Linux kernel's SCTP implementation validated INIT chunks when performing Address Configuration Change (ASCONF). A remote attacker could use this flaw to crash the system by sending a specially crafted SCTP packet to trigger a NULL pointer dereference on the system.

Отчет

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for the respective releases may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise MRG 2realtime-kernelAffected
Red Hat Enterprise Linux 6kernelFixedRHSA-2015:008727.01.2015
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2015:069517.03.2015
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2015:028503.03.2015
Red Hat Enterprise Linux 6.5 Extended Update SupportkernelFixedRHSA-2015:028403.03.2015
Red Hat Enterprise Linux 7kernelFixedRHSA-2015:010228.01.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1163087kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet

7.1 High

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

nvd
почти 11 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

debian
почти 11 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCT ...

github
больше 3 лет назад

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.

oracle-oval
больше 10 лет назад

ELSA-2015-3005: Unbreakable Enterprise kernel security update (IMPORTANT)

7.1 High

CVSS2