CVE-2006-2272

Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via incoming IP fragmented (1) COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html Patch
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=62b08083ec3dbfd7e533c8d230dd1d8191a6e813
http://labs.musecurity.com/advisories/MU-200605-01.txt Patch Vendor Advisory
http://secunia.com/advisories/19990 Patch Vendor Advisory
http://secunia.com/advisories/20157
http://secunia.com/advisories/20237
http://secunia.com/advisories/20398
http://secunia.com/advisories/20671
http://secunia.com/advisories/20716
http://secunia.com/advisories/20914
http://secunia.com/advisories/21476
http://secunia.com/advisories/21745
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://www.debian.org/security/2006/dsa-1097
http://www.debian.org/security/2006/dsa-1103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/25633
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.securityfocus.com/bid/17910
http://www.trustix.org/errata/2006/0026
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1734
http://www.vupen.com/english/advisories/2006/2554
https://exchange.xforce.ibmcloud.com/vulnerabilities/26431
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11243
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html Patch
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=62b08083ec3dbfd7e533c8d230dd1d8191a6e813
http://labs.musecurity.com/advisories/MU-200605-01.txt Patch Vendor Advisory
http://secunia.com/advisories/19990 Patch Vendor Advisory
http://secunia.com/advisories/20157
http://secunia.com/advisories/20237
http://secunia.com/advisories/20398
http://secunia.com/advisories/20671
http://secunia.com/advisories/20716
http://secunia.com/advisories/20914
http://secunia.com/advisories/21476
http://secunia.com/advisories/21745
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://www.debian.org/security/2006/dsa-1097
http://www.debian.org/security/2006/dsa-1103
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/25633
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.securityfocus.com/bid/17910
http://www.trustix.org/errata/2006/0026
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1734
http://www.vupen.com/english/advisories/2006/2554
https://exchange.xforce.ibmcloud.com/vulnerabilities/26431
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11243
Configurations

Configuration 1 (hide)

cpe:2.3:a:lksctp:stream_control_transmission_protocol:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html - Patch () http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html - Patch
References () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=62b08083ec3dbfd7e533c8d230dd1d8191a6e813 - () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=62b08083ec3dbfd7e533c8d230dd1d8191a6e813 -
References () http://labs.musecurity.com/advisories/MU-200605-01.txt - Patch, Vendor Advisory () http://labs.musecurity.com/advisories/MU-200605-01.txt - Patch, Vendor Advisory
References () http://secunia.com/advisories/19990 - Patch, Vendor Advisory () http://secunia.com/advisories/19990 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20157 - () http://secunia.com/advisories/20157 -
References () http://secunia.com/advisories/20237 - () http://secunia.com/advisories/20237 -
References () http://secunia.com/advisories/20398 - () http://secunia.com/advisories/20398 -
References () http://secunia.com/advisories/20671 - () http://secunia.com/advisories/20671 -
References () http://secunia.com/advisories/20716 - () http://secunia.com/advisories/20716 -
References () http://secunia.com/advisories/20914 - () http://secunia.com/advisories/20914 -
References () http://secunia.com/advisories/21476 - () http://secunia.com/advisories/21476 -
References () http://secunia.com/advisories/21745 - () http://secunia.com/advisories/21745 -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm -
References () http://www.debian.org/security/2006/dsa-1097 - () http://www.debian.org/security/2006/dsa-1097 -
References () http://www.debian.org/security/2006/dsa-1103 - () http://www.debian.org/security/2006/dsa-1103 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 -
References () http://www.novell.com/linux/security/advisories/2006-05-31.html - () http://www.novell.com/linux/security/advisories/2006-05-31.html -
References () http://www.osvdb.org/25633 - () http://www.osvdb.org/25633 -
References () http://www.redhat.com/support/errata/RHSA-2006-0493.html - () http://www.redhat.com/support/errata/RHSA-2006-0493.html -
References () http://www.securityfocus.com/bid/17910 - () http://www.securityfocus.com/bid/17910 -
References () http://www.trustix.org/errata/2006/0026 - () http://www.trustix.org/errata/2006/0026 -
References () http://www.ubuntu.com/usn/usn-302-1 - () http://www.ubuntu.com/usn/usn-302-1 -
References () http://www.vupen.com/english/advisories/2006/1734 - () http://www.vupen.com/english/advisories/2006/1734 -
References () http://www.vupen.com/english/advisories/2006/2554 - () http://www.vupen.com/english/advisories/2006/2554 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26431 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26431 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11243 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11243 -

07 Nov 2023, 01:58

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=62b08083ec3dbfd7e533c8d230dd1d8191a6e813', 'name': 'http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=62b08083ec3dbfd7e533c8d230dd1d8191a6e813', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=62b08083ec3dbfd7e533c8d230dd1d8191a6e813 -

Information

Published : 2006-05-09 16:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2272

Mitre link : CVE-2006-2272

CVE.ORG link : CVE-2006-2272


JSON object : View

Products Affected

lksctp

  • stream_control_transmission_protocol