7.8

CVE-2008-4576

sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 2.6.25.17
LinuxLinux Kernel Version2.2.27
LinuxLinux Kernel Version2.4.36
LinuxLinux Kernel Version2.4.36.1
LinuxLinux Kernel Version2.4.36.2
LinuxLinux Kernel Version2.4.36.3
LinuxLinux Kernel Version2.4.36.4
LinuxLinux Kernel Version2.4.36.5
LinuxLinux Kernel Version2.4.36.6
LinuxLinux Kernel Version2.6
LinuxLinux Kernel Version2.6.18
LinuxLinux Kernel Version2.6.18 Updaterc1
LinuxLinux Kernel Version2.6.18 Updaterc2
LinuxLinux Kernel Version2.6.18 Updaterc3
LinuxLinux Kernel Version2.6.18 Updaterc4
LinuxLinux Kernel Version2.6.18 Updaterc5
LinuxLinux Kernel Version2.6.18 Updaterc6
LinuxLinux Kernel Version2.6.18 Updaterc7
LinuxLinux Kernel Version2.6.19.4
LinuxLinux Kernel Version2.6.19.5
LinuxLinux Kernel Version2.6.19.6
LinuxLinux Kernel Version2.6.19.7
LinuxLinux Kernel Version2.6.20.16
LinuxLinux Kernel Version2.6.20.17
LinuxLinux Kernel Version2.6.20.18
LinuxLinux Kernel Version2.6.20.19
LinuxLinux Kernel Version2.6.20.20
LinuxLinux Kernel Version2.6.20.21
LinuxLinux Kernel Version2.6.21.5
LinuxLinux Kernel Version2.6.21.6
LinuxLinux Kernel Version2.6.21.7
LinuxLinux Kernel Version2.6.22
LinuxLinux Kernel Version2.6.22.1
LinuxLinux Kernel Version2.6.22.2
LinuxLinux Kernel Version2.6.22.8
LinuxLinux Kernel Version2.6.22.9
LinuxLinux Kernel Version2.6.22.10
LinuxLinux Kernel Version2.6.22.11
LinuxLinux Kernel Version2.6.22.12
LinuxLinux Kernel Version2.6.22.13
LinuxLinux Kernel Version2.6.22.14
LinuxLinux Kernel Version2.6.22.15
LinuxLinux Kernel Version2.6.22.17
LinuxLinux Kernel Version2.6.22.18
LinuxLinux Kernel Version2.6.22.19
LinuxLinux Kernel Version2.6.22.20
LinuxLinux Kernel Version2.6.22.21
LinuxLinux Kernel Version2.6.22.22
LinuxLinux Kernel Version2.6.22_rc1
LinuxLinux Kernel Version2.6.22_rc7
LinuxLinux Kernel Version2.6.23
LinuxLinux Kernel Version2.6.23.8
LinuxLinux Kernel Version2.6.23.9
LinuxLinux Kernel Version2.6.23.10
LinuxLinux Kernel Version2.6.23.11
LinuxLinux Kernel Version2.6.23.12
LinuxLinux Kernel Version2.6.23.13
LinuxLinux Kernel Version2.6.23.15
LinuxLinux Kernel Version2.6.23.16
LinuxLinux Kernel Version2.6.23.17
LinuxLinux Kernel Version2.6.23_rc1
LinuxLinux Kernel Version2.6.24
LinuxLinux Kernel Version2.6.24.1
LinuxLinux Kernel Version2.6.24.2
LinuxLinux Kernel Version2.6.24.3
LinuxLinux Kernel Version2.6.24.4
LinuxLinux Kernel Version2.6.24.5
LinuxLinux Kernel Version2.6.24.6
LinuxLinux Kernel Version2.6.24.7
LinuxLinux Kernel Version2.6.24_rc1
LinuxLinux Kernel Version2.6.24_rc4
LinuxLinux Kernel Version2.6.24_rc5
LinuxLinux Kernel Version2.6.25
LinuxLinux Kernel Version2.6.25.1
LinuxLinux Kernel Version2.6.25.1 Editionx86_64
LinuxLinux Kernel Version2.6.25.2
LinuxLinux Kernel Version2.6.25.2 Editionx86_64
LinuxLinux Kernel Version2.6.25.3
LinuxLinux Kernel Version2.6.25.3 Editionx86_64
LinuxLinux Kernel Version2.6.25.4
LinuxLinux Kernel Version2.6.25.4 Editionx86_64
LinuxLinux Kernel Version2.6.25.5
LinuxLinux Kernel Version2.6.25.5 Editionx86_64
LinuxLinux Kernel Version2.6.25.6
LinuxLinux Kernel Version2.6.25.6 Editionx86_64
LinuxLinux Kernel Version2.6.25.7
LinuxLinux Kernel Version2.6.25.7 Editionx86_64
LinuxLinux Kernel Version2.6.25.8
LinuxLinux Kernel Version2.6.25.8 Editionx86_64
LinuxLinux Kernel Version2.6.25.9
LinuxLinux Kernel Version2.6.25.9 Editionx86_64
LinuxLinux Kernel Version2.6.25.10
LinuxLinux Kernel Version2.6.25.10 Editionx86_64
LinuxLinux Kernel Version2.6.25.11
LinuxLinux Kernel Version2.6.25.11 Editionx86_64
LinuxLinux Kernel Version2.6.25.12
LinuxLinux Kernel Version2.6.25.12 Editionx86_64
LinuxLinux Kernel Version2.6.25.13
LinuxLinux Kernel Version2.6.25.14
LinuxLinux Kernel Version2.6.25.15
LinuxLinux Kernel Version2.6.25.16
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.82% 0.889
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.