← Retour aux CVEs
CVE-2006-2274
N/ADescription
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
Details CVE
Score CVSS v3.1N/A
Publie5/9/2006
Derniere modification4/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
lksctp:stream_control_transmission_protocol
References
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(cve@mitre.org)
http://secunia.com/advisories/20237(cve@mitre.org)
http://secunia.com/advisories/20398(cve@mitre.org)
http://secunia.com/advisories/20671(cve@mitre.org)
http://secunia.com/advisories/20716(cve@mitre.org)
http://secunia.com/advisories/20914(cve@mitre.org)
http://secunia.com/advisories/21045(cve@mitre.org)
http://secunia.com/advisories/21476(cve@mitre.org)
http://secunia.com/advisories/21745(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1097(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1103(cve@mitre.org)
http://www.osvdb.org/25746(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(cve@mitre.org)
http://www.securityfocus.com/bid/17955(cve@mitre.org)
http://www.trustix.org/errata/2006/0026(cve@mitre.org)
http://www.ubuntu.com/usn/usn-302-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2006/2554(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(cve@mitre.org)
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20237(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20398(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20671(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20716(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20914(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21045(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21476(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21745(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1097(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1103(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006-05-31.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25746(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17955(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2006/0026(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-302-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2554(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.