** Description changed:

- A flaw was found in the way Linux kernel's SCTP network protocol
- implementation handled duplicate cookies. A transient empty association
- is created while processing the duplicate cookie chunk that userspace
- could query, potentially leading to NULL pointer dereference. A remote
- attacker able to initiate SCTP connection to the system could use this
- flaw to create transient conditions that could lead to remote system
- crash if remote system user is querying SCTP connection info at the time
- these conditions exist.
+ The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the
+ SCTP implementation in the Linux kernel before 3.8.5 does not properly
+ handle associations during the processing of a duplicate COOKIE ECHO
+ chunk, which allows remote attackers to cause a denial of service (NULL
+ pointer dereference and system crash) or possibly have unspecified other
+ impact via crafted SCTP traffic.
  
  Break-Fix: - f2815633504b442ca0b0605c16bf3d88a3a0fcea

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1194445

Title:
  CVE-2013-2206

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1194445/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to