CVE-2006-2271

The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html Patch
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=35d63edb1c807bc5317e49592260e84637bc432e
http://labs.musecurity.com/advisories/MU-200605-01.txt Patch
http://secunia.com/advisories/19990 Patch Vendor Advisory
http://secunia.com/advisories/20157
http://secunia.com/advisories/20237
http://secunia.com/advisories/20398
http://secunia.com/advisories/20671
http://secunia.com/advisories/20716
http://secunia.com/advisories/20914
http://secunia.com/advisories/21476
http://secunia.com/advisories/21745
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://www.debian.org/security/2006/dsa-1097
http://www.debian.org/security/2006/dsa-1103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/25632
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.securityfocus.com/bid/17910
http://www.trustix.org/errata/2006/0026
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1734
http://www.vupen.com/english/advisories/2006/2554
https://exchange.xforce.ibmcloud.com/vulnerabilities/26430
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10934
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html Patch
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=35d63edb1c807bc5317e49592260e84637bc432e
http://labs.musecurity.com/advisories/MU-200605-01.txt Patch
http://secunia.com/advisories/19990 Patch Vendor Advisory
http://secunia.com/advisories/20157
http://secunia.com/advisories/20237
http://secunia.com/advisories/20398
http://secunia.com/advisories/20671
http://secunia.com/advisories/20716
http://secunia.com/advisories/20914
http://secunia.com/advisories/21476
http://secunia.com/advisories/21745
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://www.debian.org/security/2006/dsa-1097
http://www.debian.org/security/2006/dsa-1103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/25632
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.securityfocus.com/bid/17910
http://www.trustix.org/errata/2006/0026
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1734
http://www.vupen.com/english/advisories/2006/2554
https://exchange.xforce.ibmcloud.com/vulnerabilities/26430
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10934
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:lksctp:lksctp:2.6.0_test1_0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.0_test4_0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.2_0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.3_1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.6_1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.10_1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.13_1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.14_1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.15_1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:lksctp:lksctp:2.6.16_1.0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html - Patch () http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html - Patch
References () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=35d63edb1c807bc5317e49592260e84637bc432e - () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=35d63edb1c807bc5317e49592260e84637bc432e -
References () http://labs.musecurity.com/advisories/MU-200605-01.txt - Patch () http://labs.musecurity.com/advisories/MU-200605-01.txt - Patch
References () http://secunia.com/advisories/19990 - Patch, Vendor Advisory () http://secunia.com/advisories/19990 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20157 - () http://secunia.com/advisories/20157 -
References () http://secunia.com/advisories/20237 - () http://secunia.com/advisories/20237 -
References () http://secunia.com/advisories/20398 - () http://secunia.com/advisories/20398 -
References () http://secunia.com/advisories/20671 - () http://secunia.com/advisories/20671 -
References () http://secunia.com/advisories/20716 - () http://secunia.com/advisories/20716 -
References () http://secunia.com/advisories/20914 - () http://secunia.com/advisories/20914 -
References () http://secunia.com/advisories/21476 - () http://secunia.com/advisories/21476 -
References () http://secunia.com/advisories/21745 - () http://secunia.com/advisories/21745 -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm -
References () http://www.debian.org/security/2006/dsa-1097 - () http://www.debian.org/security/2006/dsa-1097 -
References () http://www.debian.org/security/2006/dsa-1103 - () http://www.debian.org/security/2006/dsa-1103 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 -
References () http://www.novell.com/linux/security/advisories/2006-05-31.html - () http://www.novell.com/linux/security/advisories/2006-05-31.html -
References () http://www.osvdb.org/25632 - () http://www.osvdb.org/25632 -
References () http://www.redhat.com/support/errata/RHSA-2006-0493.html - () http://www.redhat.com/support/errata/RHSA-2006-0493.html -
References () http://www.securityfocus.com/bid/17910 - () http://www.securityfocus.com/bid/17910 -
References () http://www.trustix.org/errata/2006/0026 - () http://www.trustix.org/errata/2006/0026 -
References () http://www.ubuntu.com/usn/usn-302-1 - () http://www.ubuntu.com/usn/usn-302-1 -
References () http://www.vupen.com/english/advisories/2006/1734 - () http://www.vupen.com/english/advisories/2006/1734 -
References () http://www.vupen.com/english/advisories/2006/2554 - () http://www.vupen.com/english/advisories/2006/2554 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26430 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26430 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10934 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10934 -

07 Nov 2023, 01:58

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=35d63edb1c807bc5317e49592260e84637bc432e', 'name': 'http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=35d63edb1c807bc5317e49592260e84637bc432e', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=35d63edb1c807bc5317e49592260e84637bc432e -

Information

Published : 2006-05-09 16:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2271

Mitre link : CVE-2006-2271

CVE.ORG link : CVE-2006-2271


JSON object : View

Products Affected

lksctp

  • lksctp