It is possible to crash the remote host by sending it a malformed SCTP packet.
There is a flaw in the Linux kernel on the remote host that causes a kernel panic when it receives an SCTP packet with a chunk data packet of length 0. An attacker can leverage this flaw to crash the remote host. Additionally, other types of crafted packets can cause a remote denial of service in various SCTP related functions. Note that successful exploitation of this issue requires that the kernel support SCTP protocol connection tracking.
Upgrade to Linux kernel 184.108.40.206 / 220.127.116.11 or later.