Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (deadlock) via a large number of small messages to a receiver application that cannot process the messages quickly enough, which leads to "spillover of the receive buffer."
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c3ceb4fb9667f34f1599a062efecf4cdc4a4ce5 - Broken Link | |
References | () http://secunia.com/advisories/20716 - Broken Link | |
References | () http://secunia.com/advisories/21465 - Broken Link | |
References | () http://secunia.com/advisories/22417 - Broken Link | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0575.html - Broken Link | |
References | () http://www.securityfocus.com/bid/17955 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.trustix.org/errata/2006/0026 - Broken Link | |
References | () http://www.ubuntu.com/usn/usn-302-1 - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26433 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11295 - Broken Link |
15 Feb 2024, 20:22
Type | Values Removed | Values Added |
---|---|---|
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11295 - Broken Link | |
References | (TRUSTIX) http://www.trustix.org/errata/2006/0026 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/20716 - Broken Link | |
References | (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-302-1 - Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/26433 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/17955 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/21465 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/22417 - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2006-0575.html - Broken Link | |
References | () http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c3ceb4fb9667f34f1599a062efecf4cdc4a4ce5 - Broken Link | |
CPE | cpe:2.3:a:lksctp:stream_control_transmission_protocol:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
First Time |
Canonical
Canonical ubuntu Linux |
|
CWE | CWE-667 |
07 Nov 2023, 01:58
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2006-05-09 20:02
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2275
Mitre link : CVE-2006-2275
CVE.ORG link : CVE-2006-2275
JSON object : View
Products Affected
canonical
- ubuntu_linux
lksctp
- stream_control_transmission_protocol
CWE
CWE-667
Improper Locking