Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-4618

Опубликовано: 21 окт. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.8

Описание

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

gutsy

DNE

hardy

released

2.6.24-22.45
intrepid

not-affected

upstream

released

2.6.27~rc9

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-53.74
devel

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

upstream

released

2.6.27~rc9

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

gutsy

released

2.6.22-16.60
hardy

DNE

intrepid

DNE

upstream

released

2.6.27~rc9

Показывать по

EPSS

Процентиль: 76%
0.01011
Низкий

7.8 High

CVSS2

Связанные уязвимости

redhat
почти 17 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

nvd
почти 17 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

debian
почти 17 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the ...

github
больше 3 лет назад

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

fstec
больше 10 лет назад

Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 76%
0.01011
Низкий

7.8 High

CVSS2