The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://svnweb.freebsd.org/base?view=revision&revision=254338 - Patch | |
References | () http://www.freebsd.org/security/advisories/FreeBSD-SA-13:10.sctp.asc - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/61939 - | |
References | () http://www.securitytracker.com/id/1028940 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=905080 - |
Information
Published : 2013-08-29 12:07
Updated : 2024-11-21 01:57
NVD link : CVE-2013-5209
Mitre link : CVE-2013-5209
CVE.ORG link : CVE-2013-5209
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor