CVE-2010-3705

Priority
Medium
Description
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel
before 2.6.36 does not properly validate the hmac_ids array of an SCTP
peer, which allows remote attackers to cause a denial of service (memory
corruption and panic) via a crafted value in the last element of this
array.
Ubuntu-Description
Dan Rosenberg discovered that SCTP did not correctly handle HMAC
calculations. A remote attacker could send specially crafted traffic that
would crash the system, leading to a denial of service.
References
Assigned-to
smb
Package
Upstream:not-affected
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: linux (LP Ubuntu Debian)
Upstream:needed
Patches:
Proposed:http://marc.info/?l=linux-kernel&m=128596992418814&w=2
Hardy:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/hardy/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Jaunty:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/jaunty/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Karmic:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/karmic/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Lucid:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/lucid/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Maverick:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/maverick/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Package
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Updated: 2016-03-23 03:37:52 UTC (commit 10817)