CVE-2006-2934

SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.
References
Link Resource
http://secunia.com/advisories/20917 Vendor Advisory
http://secunia.com/advisories/20986 Vendor Advisory
http://secunia.com/advisories/21179 Vendor Advisory
http://secunia.com/advisories/21298 Vendor Advisory
http://secunia.com/advisories/21465 Vendor Advisory
http://secunia.com/advisories/21498 Vendor Advisory
http://secunia.com/advisories/21614 Vendor Advisory
http://secunia.com/advisories/21934 Vendor Advisory
http://secunia.com/advisories/22417 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://www.kb.cert.org/vuls/id/717844 US Government Resource
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git%3Ba=commit%3Bh=9c48e1ea8cf8800cc5e2d39ccbb8b5ff9704f8e9
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.23
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.3
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
http://www.osvdb.org/26963
http://www.redhat.com/support/errata/RHSA-2006-0575.html
http://www.securityfocus.com/archive/1/439483/100/100/threaded
http://www.securityfocus.com/archive/1/439610/100/100/threaded
http://www.securityfocus.com/bid/18755
http://www.ubuntu.com/usn/usn-331-1
http://www.ubuntu.com/usn/usn-346-1
http://www.vupen.com/english/advisories/2006/2623 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197387 Patch
https://issues.rpath.com/browse/RPL-488
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10932
http://secunia.com/advisories/20917 Vendor Advisory
http://secunia.com/advisories/20986 Vendor Advisory
http://secunia.com/advisories/21179 Vendor Advisory
http://secunia.com/advisories/21298 Vendor Advisory
http://secunia.com/advisories/21465 Vendor Advisory
http://secunia.com/advisories/21498 Vendor Advisory
http://secunia.com/advisories/21614 Vendor Advisory
http://secunia.com/advisories/21934 Vendor Advisory
http://secunia.com/advisories/22417 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://www.kb.cert.org/vuls/id/717844 US Government Resource
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git%3Ba=commit%3Bh=9c48e1ea8cf8800cc5e2d39ccbb8b5ff9704f8e9
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.23
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.3
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
http://www.osvdb.org/26963
http://www.redhat.com/support/errata/RHSA-2006-0575.html
http://www.securityfocus.com/archive/1/439483/100/100/threaded
http://www.securityfocus.com/archive/1/439610/100/100/threaded
http://www.securityfocus.com/bid/18755
http://www.ubuntu.com/usn/usn-331-1
http://www.ubuntu.com/usn/usn-346-1
http://www.vupen.com/english/advisories/2006/2623 Vendor Advisory
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197387 Patch
https://issues.rpath.com/browse/RPL-488
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10932
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://secunia.com/advisories/20917 - Vendor Advisory () http://secunia.com/advisories/20917 - Vendor Advisory
References () http://secunia.com/advisories/20986 - Vendor Advisory () http://secunia.com/advisories/20986 - Vendor Advisory
References () http://secunia.com/advisories/21179 - Vendor Advisory () http://secunia.com/advisories/21179 - Vendor Advisory
References () http://secunia.com/advisories/21298 - Vendor Advisory () http://secunia.com/advisories/21298 - Vendor Advisory
References () http://secunia.com/advisories/21465 - Vendor Advisory () http://secunia.com/advisories/21465 - Vendor Advisory
References () http://secunia.com/advisories/21498 - Vendor Advisory () http://secunia.com/advisories/21498 - Vendor Advisory
References () http://secunia.com/advisories/21614 - Vendor Advisory () http://secunia.com/advisories/21614 - Vendor Advisory
References () http://secunia.com/advisories/21934 - Vendor Advisory () http://secunia.com/advisories/21934 - Vendor Advisory
References () http://secunia.com/advisories/22417 - Vendor Advisory () http://secunia.com/advisories/22417 - Vendor Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm -
References () http://www.kb.cert.org/vuls/id/717844 - US Government Resource () http://www.kb.cert.org/vuls/id/717844 - US Government Resource
References () http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git%3Ba=commit%3Bh=9c48e1ea8cf8800cc5e2d39ccbb8b5ff9704f8e9 - () http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git%3Ba=commit%3Bh=9c48e1ea8cf8800cc5e2d39ccbb8b5ff9704f8e9 -
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.23 - () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.23 -
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.3 - () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.3 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:151 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:151 -
References () http://www.novell.com/linux/security/advisories/2006_42_kernel.html - () http://www.novell.com/linux/security/advisories/2006_42_kernel.html -
References () http://www.novell.com/linux/security/advisories/2006_47_kernel.html - () http://www.novell.com/linux/security/advisories/2006_47_kernel.html -
References () http://www.osvdb.org/26963 - () http://www.osvdb.org/26963 -
References () http://www.redhat.com/support/errata/RHSA-2006-0575.html - () http://www.redhat.com/support/errata/RHSA-2006-0575.html -
References () http://www.securityfocus.com/archive/1/439483/100/100/threaded - () http://www.securityfocus.com/archive/1/439483/100/100/threaded -
References () http://www.securityfocus.com/archive/1/439610/100/100/threaded - () http://www.securityfocus.com/archive/1/439610/100/100/threaded -
References () http://www.securityfocus.com/bid/18755 - () http://www.securityfocus.com/bid/18755 -
References () http://www.ubuntu.com/usn/usn-331-1 - () http://www.ubuntu.com/usn/usn-331-1 -
References () http://www.ubuntu.com/usn/usn-346-1 - () http://www.ubuntu.com/usn/usn-346-1 -
References () http://www.vupen.com/english/advisories/2006/2623 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2623 - Vendor Advisory
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197387 - Patch () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197387 - Patch
References () https://issues.rpath.com/browse/RPL-488 - () https://issues.rpath.com/browse/RPL-488 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10932 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10932 -

Information

Published : 2006-06-30 21:05

Updated : 2024-11-21 00:12


NVD link : CVE-2006-2934

Mitre link : CVE-2006-2934

CVE.ORG link : CVE-2006-2934


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors