Linux SCTP ECNE Chunk Handling Remote DoS

High Nessus Plugin ID 21560


It is possible to crash the remote host by sending it an SCTP packet.


There is a flaw in the SCTP code included in Linux kernel versions 2.6.16.x that results in a kernel panic when an SCTP packet with an unexpected ECNE chunk is received in a CLOSED state. An attacker can leverage this flaw to crash the remote host with a single, possibly forged, packet.


Upgrade to Linux kernel version 2.6.17 or later.

See Also

Plugin Details

Severity: High

ID: 21560

File Name: linux_sctp_unexpect_ecne_chunk_dos.nasl

Version: $Revision: 1.22 $

Type: remote

Published: 2006/05/15

Modified: 2016/10/27

Dependencies: 11936

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:linux:kernel

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/05/09

Reference Information

CVE: CVE-2006-2271

BID: 17910

OSVDB: 25632