Linux Kernel Netfilter *_conntrack_proto_sctp.c sctp_new Function Unknown Chunk Type Remote DoS

medium Nessus Plugin ID 25483

Synopsis

It is possible to crash the remote host by sending it a specially- crafted packet.

Description

There is a flaw in the SCTP code included in Linux kernel versions before 2.6.21.4 that results in a kernel panic when an SCTP packet with an unknown chunk type is received. An attacker can leverage this flaw to crash the remote host with a single, possibly forged, packet.

Solution

Upgrade to Linux kernel version 2.6.21.4 or later.

See Also

http://www.nessus.org/u?a4ca7f3b

Plugin Details

Severity: Medium

ID: 25483

File Name: linux_sctp_unknown_chunk_type_dos.nasl

Version: 1.17

Type: remote

Published: 6/12/2007

Updated: 7/14/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:linux:kernel

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/8/2007

Reference Information

CVE: CVE-2007-2876

BID: 24376