CVE-2014-5077

medium

Description

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.

References

https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa

https://exchange.xforce.ibmcloud.com/vulnerabilities/95134

https://bugzilla.redhat.com/show_bug.cgi?id=1122982

http://www.ubuntu.com/usn/USN-2359-1

http://www.ubuntu.com/usn/USN-2358-1

http://www.ubuntu.com/usn/USN-2335-1

http://www.ubuntu.com/usn/USN-2334-1

http://www.securitytracker.com/id/1030681

http://www.securityfocus.com/bid/68881

http://www.openwall.com/lists/oss-security/2014/07/26/1

http://secunia.com/advisories/62563

http://secunia.com/advisories/60744

http://secunia.com/advisories/60564

http://secunia.com/advisories/60545

http://secunia.com/advisories/60430

http://secunia.com/advisories/59777

http://rhn.redhat.com/errata/RHSA-2014-1763.html

http://rhn.redhat.com/errata/RHSA-2014-1668.html

http://rhn.redhat.com/errata/RHSA-2014-1083.html

http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa

Details

Source: Mitre, NVD

Published: 2014-08-01

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Severity: High

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium