7.8

CVE-2014-3673

Exploit

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.6.12 < 3.2.64
LinuxLinux Kernel Version >= 3.3 < 3.4.107
LinuxLinux Kernel Version >= 3.5 < 3.10.61
LinuxLinux Kernel Version >= 3.11 < 3.12.34
LinuxLinux Kernel Version >= 3.13 < 3.14.25
LinuxLinux Kernel Version >= 3.15 < 3.16.35
LinuxLinux Kernel Version >= 3.17 < 3.17.4
RedhatEnterprise Linux Version5.0
RedhatEnterprise Mrg Version2.0
CanonicalUbuntu Linux Version12.04 SwEditionesm
DebianDebian Linux Version7.0
OpensuseEvergreen Version11.4
SuseSuse Linux Enterprise Server Version10 Updatesp4 SwEditionltss
SuseSuse Linux Enterprise Server Version11 Updatesp1 SwEditionltss
SuseSuse Linux Enterprise Server Version11 Updatesp2 SwEditionltss
OracleLinux Version5 Update-
OracleLinux Version6 Update-
OracleLinux Version7 Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 9.8% 0.922
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

http://marc.info/?l=bugtraq&m=142722450701342&w=2
Third Party Advisory
Mailing List
http://marc.info/?l=bugtraq&m=142722544401658&w=2
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/70883
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1147850
Third Party Advisory
Exploit
Issue Tracking