Linux SCTP ECNE Chunk Handling Remote DoS

High Nessus Plugin ID 21560

Synopsis

It is possible to crash the remote host by sending it an SCTP packet.

Description

There is a flaw in the SCTP code included in Linux kernel versions 2.6.16.x that results in a kernel panic when an SCTP packet with an unexpected ECNE chunk is received in a CLOSED state. An attacker can leverage this flaw to crash the remote host with a single, possibly forged, packet.

Solution

Upgrade to Linux kernel version 2.6.17 or later.

See Also

http://seclists.org/fulldisclosure/2006/May/230

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17

Plugin Details

Severity: High

ID: 21560

File Name: linux_sctp_unexpect_ecne_chunk_dos.nasl

Version: 1.23

Type: remote

Published: 2006/05/15

Modified: 2018/07/14

Dependencies: 11936

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:linux:kernel

Required KB Items: Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2006/05/09

Reference Information

CVE: CVE-2006-2271

BID: 17910