Linux SCTP ECNE Chunk Handling Remote DoS

High Nessus Plugin ID 21560


It is possible to crash the remote host by sending it an SCTP packet.


There is a flaw in the SCTP code included in Linux kernel versions 2.6.16.x that results in a kernel panic when an SCTP packet with an unexpected ECNE chunk is received in a CLOSED state. An attacker can leverage this flaw to crash the remote host with a single, possibly forged, packet.


Upgrade to Linux kernel version 2.6.17 or later.

See Also

Plugin Details

Severity: High

ID: 21560

File Name: linux_sctp_unexpect_ecne_chunk_dos.nasl

Version: 1.24

Type: remote

Published: 2006/05/15

Updated: 2018/11/15

Dependencies: 11936

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:linux:kernel

Required KB Items: Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2006/05/09

Reference Information

CVE: CVE-2006-2271

BID: 17910