[Forgot Password]
Login  Register Subscribe

23631

 
 

120347

 
 

98503

 
 

909

 
 

79321

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-3526

Date: (C)2008-08-27   (M)2017-11-18 


Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.

CVSS Score: 7.8Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: COMPLETE





Reference:
BID-30847
SECUNIA-31881
SECUNIA-32190
SECUNIA-32393
DSA-1636
MDVSA-2008:223
RHSA-2008:0857
SUSE-SA:2008:053
USN-659-1
http://www.openwall.com/lists/oss-security/2008/08/26/9
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git;a=commit;h=30c2235cbc477d4629983d440cdc4f496fec9246
linux-kernel-sctpsetsockoptauthkey-dos(44723)

CPE    30
cpe:/o:linux:linux_kernel:2.6.24:rc3
cpe:/o:linux:linux_kernel:2.6.24:rc2
cpe:/o:linux:linux_kernel:2.6.24.1
cpe:/o:linux:linux_kernel:2.6.26.1
...
CWE    1
CWE-189
OVAL    2
oval:org.secpod.oval:def:301573
oval:org.mitre.oval:def:8234

© 2013 SecPod Technologies