CVE-2008-3792

Priority
Low
Description
net/sctp/socket.c in the Stream Control Transmission Protocol (sctp)
implementation in the Linux kernel before 2.6.26.4 does not verify that the
SCTP-AUTH extension is enabled before proceeding with SCTP-AUTH API
functions, which allows attackers to cause a denial of service (NULL
pointer dereference and panic) via vectors that result in calls to (1)
sctp_setsockopt_auth_chunk, (2) sctp_setsockopt_hmac_ident, (3)
sctp_setsockopt_auth_key, (4) sctp_setsockopt_active_key, (5)
sctp_setsockopt_del_key, (6) sctp_getsockopt_maxburst, (7)
sctp_getsockopt_active_key, (8) sctp_getsockopt_peer_auth_chunks, or (9)
sctp_getsockopt_local_auth_chunks.
Ubuntu-Description
It was discovered that SCTP did not correctly validate its userspace
arguments. A local attacker could call certain sctp_* functions
with malicious options and cause a system crash, leading to a denial
of service.
References
Assigned-to
smb_tp
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Package
Source: linux (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):released (2.6.24-21.43)
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:19:01 UTC (commit 5347)