Linux SCTP ECNE Chunk Handling Remote DoS

high Nessus Plugin ID 21560

Synopsis

It is possible to crash the remote host by sending it an SCTP packet.

Description

There is a flaw in the SCTP code included in Linux kernel versions 2.6.16.x that results in a kernel panic when an SCTP packet with an unexpected ECNE chunk is received in a CLOSED state. An attacker can leverage this flaw to crash the remote host with a single, possibly forged, packet.

Solution

Upgrade to Linux kernel version 2.6.17 or later.

See Also

https://seclists.org/fulldisclosure/2006/May/230

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17

Plugin Details

Severity: High

ID: 21560

File Name: linux_sctp_unexpect_ecne_chunk_dos.nasl

Version: 1.24

Type: remote

Published: 5/15/2006

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:linux:kernel

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/9/2006

Reference Information

CVE: CVE-2006-2271

BID: 17910