CVE-2010-3705

Priority
Medium
Description
The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel
before 2.6.36 does not properly validate the hmac_ids array of an SCTP
peer, which allows remote attackers to cause a denial of service (memory
corruption and panic) via a crafted value in the last element of this
array.
Ubuntu-Description
Dan Rosenberg discovered that SCTP did not correctly handle HMAC
calculations. A remote attacker could send specially crafted traffic that
would crash the system, leading to a denial of service.
References
Assigned-to
smb
Package
Upstream:not-affected
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Source: linux (LP Ubuntu Debian)
Upstream:needed
Patches:
Proposed:http://marc.info/?l=linux-kernel&m=128596992418814&w=2
Hardy:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/hardy/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Jaunty:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/jaunty/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Karmic:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/karmic/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Lucid:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/lucid/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Maverick:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-3705/patches/maverick/linux/0001-Fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.txt
Package
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:39:01 UTC (commit 9756)