Linux SCTP ECNE Chunk Handling Remote DoS

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

It is possible to crash the remote host by sending it an SCTP packet.

Description :

There is a flaw in the SCTP code included in Linux kernel versions
2.6.16.x that results in a kernel panic when an SCTP packet with an
unexpected ECNE chunk is received in a CLOSED state. An attacker can
leverage this flaw to crash the remote host with a single, possibly
forged, packet.

See also :

http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17

Solution :

Upgrade to Linux kernel version 2.6.17 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Denial of Service

Nessus Plugin ID: 21560 (linux_sctp_unexpect_ecne_chunk_dos.nasl)

Bugtraq ID: 17910

CVE ID: CVE-2006-2271