← Volver a CVEs
CVE-2006-2274
N/ADescripcion
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado5/9/2006
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
lksctp:stream_control_transmission_protocol
Referencias
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(cve@mitre.org)
http://secunia.com/advisories/20237(cve@mitre.org)
http://secunia.com/advisories/20398(cve@mitre.org)
http://secunia.com/advisories/20671(cve@mitre.org)
http://secunia.com/advisories/20716(cve@mitre.org)
http://secunia.com/advisories/20914(cve@mitre.org)
http://secunia.com/advisories/21045(cve@mitre.org)
http://secunia.com/advisories/21476(cve@mitre.org)
http://secunia.com/advisories/21745(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1097(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1103(cve@mitre.org)
http://www.osvdb.org/25746(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(cve@mitre.org)
http://www.securityfocus.com/bid/17955(cve@mitre.org)
http://www.trustix.org/errata/2006/0026(cve@mitre.org)
http://www.ubuntu.com/usn/usn-302-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2006/2554(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(cve@mitre.org)
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20237(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20398(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20671(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20716(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20914(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21045(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21476(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21745(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1097(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1103(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006-05-31.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25746(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17955(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2006/0026(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-302-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2554(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.