[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-2826

Date: (C)2008-07-02   (M)2017-08-08
 
CVSS Score: 4.9Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 6.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: COMPLETE











Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.

Reference:
SECTRACK-1020514
BID-29990
SECUNIA-30901
SECUNIA-31107
SECUNIA-31202
SECUNIA-31551
SECUNIA-31628
SECUNIA-32370
ADV-2008-2511
DSA-1630
MDVSA-2008:167
MDVSA-2008:174
RHSA-2008:0585
SUSE-SA:2008:037
SUSE-SA:2008:052
USN-625-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=735ce972fbc8a65fb17788debd7bbe7b4383cc62
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9
http://lwn.net/Articles/287350/
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7
https://issues.rpath.com/browse/RPL-2629
linux-kernel-sctpgetsockopt-dos(43559)

CPE    355
cpe:/o:linux:linux_kernel:2.6.20.19
cpe:/o:linux:linux_kernel:2.6.23.1
cpe:/o:linux:linux_kernel:2.6.23.2
cpe:/o:linux:linux_kernel:2.6.23.3
...
CWE    1
CWE-189
OVAL    2
oval:org.mitre.oval:def:8183
oval:org.secpod.oval:def:301293

© 2013 SecPod Technologies