Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-4445

Опубликовано: 06 окт. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.7

Описание

The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

feisty

DNE

gutsy

DNE

hardy

released

2.6.24-21.43
upstream

released

2.6.27

Показывать по

РелизСтатусПримечание
dapper

not-affected

code not present
devel

DNE

feisty

DNE

gutsy

DNE

hardy

DNE

upstream

not-affected

code not present

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

not-affected

code not present
gutsy

DNE

hardy

DNE

upstream

not-affected

code not present

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

feisty

DNE

gutsy

not-affected

code not present
hardy

DNE

upstream

not-affected

code not present

Показывать по

EPSS

Процентиль: 23%
0.00074
Низкий

4.7 Medium

CVSS2

Связанные уязвимости

redhat
около 17 лет назад

The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.

nvd
почти 17 лет назад

The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.

debian
почти 17 лет назад

The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream C ...

github
больше 3 лет назад

The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 23%
0.00074
Низкий

4.7 Medium

CVSS2