CVE-2014-0101

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ec0223ec48a90cb605244b45f7c62de856403729

http://rhn.redhat.com/errata/RHSA-2014-0328.html

http://rhn.redhat.com/errata/RHSA-2014-0419.html

http://rhn.redhat.com/errata/RHSA-2014-0432.html

http://secunia.com/advisories/59216

http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15317.html

http://www.openwall.com/lists/oss-security/2014/03/04/6

http://www.securityfocus.com/bid/65943

http://www.ubuntu.com/usn/USN-2173-1

http://www.ubuntu.com/usn/USN-2174-1

https://bugzilla.redhat.com/show_bug.cgi?id=1070705

https://github.com/torvalds/linux/commit/ec0223ec48a90cb605244b45f7c62de856403729

Details

Source: MITRE

Published: 2014-03-11

Updated: 2020-08-25

Type: CWE-476

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.13.6 (inclusive)

Configuration 2

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*

Configuration 4

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.3.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.4.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:* versions from 2.1.0 to 2.3.0 (inclusive)

cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:* versions from 3.0.0 to 3.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.3.0 to 11.5.3 (inclusive)

cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.4.1 (inclusive)

cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.1.0 to 11.3.0 (inclusive)

cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:* versions from 4.0.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:* versions from 4.2.0 to 4.5.0 (inclusive)

cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:* versions from 4.0.0 to 4.5.0 (inclusive)

Tenable Plugins

View all (30 total)

IDNameProductFamilySeverity
127146NewStart CGSL MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0004)NessusNewStart CGSL Local Security Checks
critical
124801EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1477)NessusHuawei Local Security Checks
medium
99163OracleVM 3.3 : Unbreakable / etc (OVMSA-2017-0057) (Dirty COW)NessusOracleVM Local Security Checks
critical
79021RHEL 6 : kernel (RHSA-2014:0520)NessusRed Hat Local Security Checks
critical
79016RHEL 6 : kernel (RHSA-2014:0432)NessusRed Hat Local Security Checks
high
79014RHEL 6 : kernel (RHSA-2014:0419)NessusRed Hat Local Security Checks
high
78172F5 Networks BIG-IP : Linux kernel vulnerability (K15317)NessusF5 Networks Local Security Checks
high
76557SuSE 11.3 Security Update : Linux kernel (SAT Patch Numbers 9488 / 9491 / 9493)NessusSuSE Local Security Checks
critical
75364openSUSE Security Update : kernel (openSUSE-SU-2014:0677-1)NessusSuSE Local Security Checks
high
75363openSUSE Security Update : kernel (openSUSE-SU-2014:0678-1)NessusSuSE Local Security Checks
critical
74513Mandriva Linux Security Advisory : kernel (MDVSA-2014:124)NessusMandriva Local Security Checks
critical
74215Ubuntu 13.10 : linux vulnerabilities (USN-2228-1)NessusUbuntu Local Security Checks
critical
74213Ubuntu 12.04 LTS : linux-lts-saucy vulnerabilities (USN-2225-1)NessusUbuntu Local Security Checks
critical
74212Ubuntu 12.04 LTS : linux-lts-raring vulnerabilities (USN-2224-1)NessusUbuntu Local Security Checks
critical
74211Ubuntu 12.04 LTS : linux-lts-quantal vulnerabilities (USN-2223-1)NessusUbuntu Local Security Checks
critical
74184Ubuntu 12.04 LTS : linux vulnerabilities (USN-2221-1)NessusUbuntu Local Security Checks
critical
74101Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2014-3034)NessusOracle Linux Local Security Checks
critical
73723Ubuntu 10.04 LTS : linux-ec2 vulnerabilities (USN-2174-1)NessusUbuntu Local Security Checks
critical
73722Ubuntu 10.04 LTS : linux vulnerabilities (USN-2173-1)NessusUbuntu Local Security Checks
critical
73713Debian DSA-2906-1 : linux-2.6 - privilege escalation/denial of service/information leakNessusDebian Local Security Checks
critical
73243Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3016)NessusOracle Linux Local Security Checks
critical
73236Amazon Linux AMI : kernel (ALAS-2014-317)NessusAmazon Linux Local Security Checks
high
73222Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3015)NessusOracle Linux Local Security Checks
critical
73221Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2014-3014)NessusOracle Linux Local Security Checks
critical
73200Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20140325)NessusScientific Linux Local Security Checks
high
73198RHEL 6 : kernel (RHSA-2014:0328)NessusRed Hat Local Security Checks
high
73196Oracle Linux 6 : kernel (ELSA-2014-0328)NessusOracle Linux Local Security Checks
high
73191CentOS 6 : kernel (CESA-2014:0328)NessusCentOS Local Security Checks
high
72891Fedora 19 : kernel-3.13.5-103.fc19 (2014-3448)NessusFedora Local Security Checks
high
72870Fedora 20 : kernel-3.13.5-202.fc20 (2014-3442)NessusFedora Local Security Checks
high