CVE-2011-1770 (retired)

Priority
Description
Integer underflow in the dccp_parse_options function (net/dccp/options.c)
in the Linux kernel before 2.6.33.14 allows remote attackers to cause a
denial of service via a Datagram Congestion Control Protocol (DCCP) packet
with an invalid feature options length, which triggers a buffer over-read.
Ubuntu-Description
Dan Rosenberg discovered that the DCCP stack did not correctly handle
certain packet structures. A remote attacker could exploit this to crash
the system, leading to a denial of service.
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
Package
Upstream:released (2.6.39)
More Information

Updated: 2019-03-26 11:56:28 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)