← Zuruck zu CVEs
CVE-2006-2274
N/ABeschreibung
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht5/9/2006
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
lksctp:stream_control_transmission_protocol
Referenzen
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(cve@mitre.org)
http://secunia.com/advisories/20237(cve@mitre.org)
http://secunia.com/advisories/20398(cve@mitre.org)
http://secunia.com/advisories/20671(cve@mitre.org)
http://secunia.com/advisories/20716(cve@mitre.org)
http://secunia.com/advisories/20914(cve@mitre.org)
http://secunia.com/advisories/21045(cve@mitre.org)
http://secunia.com/advisories/21476(cve@mitre.org)
http://secunia.com/advisories/21745(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1097(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1103(cve@mitre.org)
http://www.osvdb.org/25746(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(cve@mitre.org)
http://www.securityfocus.com/bid/17955(cve@mitre.org)
http://www.trustix.org/errata/2006/0026(cve@mitre.org)
http://www.ubuntu.com/usn/usn-302-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2006/2554(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(cve@mitre.org)
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20237(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20398(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20671(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20716(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20914(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21045(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21476(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21745(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1097(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1103(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006-05-31.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25746(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17955(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2006/0026(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-302-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2554(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.