fkie_cve-2006-2274
Vulnerability from fkie_nvd
Published
2006-05-09 20:02
Modified
2024-11-21 00:10
Severity ?
Summary
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
References
cve@mitre.orghttp://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6
cve@mitre.orghttp://secunia.com/advisories/20237
cve@mitre.orghttp://secunia.com/advisories/20398
cve@mitre.orghttp://secunia.com/advisories/20671
cve@mitre.orghttp://secunia.com/advisories/20716
cve@mitre.orghttp://secunia.com/advisories/20914
cve@mitre.orghttp://secunia.com/advisories/21045
cve@mitre.orghttp://secunia.com/advisories/21476
cve@mitre.orghttp://secunia.com/advisories/21745
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1097
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1103
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:123
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:150
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006-05-31.html
cve@mitre.orghttp://www.osvdb.org/25746
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0493.html
cve@mitre.orghttp://www.securityfocus.com/bid/17955
cve@mitre.orghttp://www.trustix.org/errata/2006/0026
cve@mitre.orghttp://www.ubuntu.com/usn/usn-302-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2554
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26432
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20237
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20398
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20671
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20716
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20914
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21045
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21476
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21745
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1097
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1103
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006-05-31.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25746
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0493.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17955
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0026
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-302-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2554
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26432
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531
Impacted products
Vendor Product Version
lksctp stream_control_transmission_protocol 2.6.17



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lksctp:stream_control_transmission_protocol:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D74A43C-4D2F-482A-B786-DCFA580C1770",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function."
    }
  ],
  "id": "CVE-2006-2274",
  "lastModified": "2024-11-21T00:10:57.223",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-09T20:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20237"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20398"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20671"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20716"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20914"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21045"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21476"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21745"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1097"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1103"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:123"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:150"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/25746"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0493.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17955"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0026"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-302-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2554"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26432"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20237"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20671"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20716"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21045"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21476"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21745"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006-05-31.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25746"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0493.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-302-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.