The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa - Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1083.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1668.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1763.html - Third Party Advisory | |
References | () http://secunia.com/advisories/59777 - Third Party Advisory | |
References | () http://secunia.com/advisories/60430 - Third Party Advisory | |
References | () http://secunia.com/advisories/60545 - Third Party Advisory | |
References | () http://secunia.com/advisories/60564 - Third Party Advisory | |
References | () http://secunia.com/advisories/60744 - Third Party Advisory | |
References | () http://secunia.com/advisories/62563 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2014/07/26/1 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/68881 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030681 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2334-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2335-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2358-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-2359-1 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1122982 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/95134 - Third Party Advisory, VDB Entry | |
References | () https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa - Patch, Third Party Advisory |
Information
Published : 2014-08-01 11:13
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5077
Mitre link : CVE-2014-5077
CVE.ORG link : CVE-2014-5077
JSON object : View
Products Affected
suse
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_real_time_extension
canonical
- ubuntu_linux
redhat
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_server_tus
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference