CVE-2008-2826

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=735ce972fbc8a65fb17788debd7bbe7b4383cc62

http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9

http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html

http://lwn.net/Articles/287350/

http://secunia.com/advisories/30901

http://secunia.com/advisories/31107

http://secunia.com/advisories/31202

http://secunia.com/advisories/31551

http://secunia.com/advisories/31628

http://secunia.com/advisories/32370

http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0207

http://www.debian.org/security/2008/dsa-1630

http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.7

http://www.mandriva.com/security/advisories?name=MDVSA-2008:167

http://www.mandriva.com/security/advisories?name=MDVSA-2008:174

http://www.redhat.com/support/errata/RHSA-2008-0585.html

http://www.securityfocus.com/bid/29990

http://www.securitytracker.com/id?1020514

http://www.ubuntu.com/usn/usn-625-1

http://www.vupen.com/english/advisories/2008/2511

https://exchange.xforce.ibmcloud.com/vulnerabilities/43559

https://issues.rpath.com/browse/RPL-2629

Details

Source: MITRE

Published: 2008-07-02

Updated: 2020-08-25

Type: CWE-190

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
40007openSUSE Security Update : kernel (kernel-67)NessusSuSE Local Security Checks
medium
36653Mandriva Linux Security Advisory : kernel (MDVSA-2008:167)NessusMandriva Local Security Checks
high
34457openSUSE 10 Security Update : kernel (kernel-5700)NessusSuSE Local Security Checks
critical
34032Debian DSA-1630-1 : linux-2.6 - denial of service/information leakNessusDebian Local Security Checks
high
33531Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/20/22 vulnerabilities (USN-625-1)NessusUbuntu Local Security Checks
critical