← Back to CVEs
CVE-2006-2274
N/ADescription
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
CVE Details
CVSS v3.1 ScoreN/A
Published5/9/2006
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
lksctp:stream_control_transmission_protocol
References
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(cve@mitre.org)
http://secunia.com/advisories/20237(cve@mitre.org)
http://secunia.com/advisories/20398(cve@mitre.org)
http://secunia.com/advisories/20671(cve@mitre.org)
http://secunia.com/advisories/20716(cve@mitre.org)
http://secunia.com/advisories/20914(cve@mitre.org)
http://secunia.com/advisories/21045(cve@mitre.org)
http://secunia.com/advisories/21476(cve@mitre.org)
http://secunia.com/advisories/21745(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1097(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1103(cve@mitre.org)
http://www.osvdb.org/25746(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(cve@mitre.org)
http://www.securityfocus.com/bid/17955(cve@mitre.org)
http://www.trustix.org/errata/2006/0026(cve@mitre.org)
http://www.ubuntu.com/usn/usn-302-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2006/2554(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(cve@mitre.org)
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20237(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20398(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20671(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20716(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20914(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21045(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21476(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21745(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1097(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1103(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006-05-31.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25746(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17955(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2006/0026(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-302-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2554(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.