← Voltar para CVEs
CVE-2006-2274
N/ADescricao
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado5/9/2006
Ultima modificacao4/16/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
lksctp:stream_control_transmission_protocol
Referencias
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(cve@mitre.org)
http://secunia.com/advisories/20237(cve@mitre.org)
http://secunia.com/advisories/20398(cve@mitre.org)
http://secunia.com/advisories/20671(cve@mitre.org)
http://secunia.com/advisories/20716(cve@mitre.org)
http://secunia.com/advisories/20914(cve@mitre.org)
http://secunia.com/advisories/21045(cve@mitre.org)
http://secunia.com/advisories/21476(cve@mitre.org)
http://secunia.com/advisories/21745(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1097(cve@mitre.org)
http://www.debian.org/security/2006/dsa-1103(cve@mitre.org)
http://www.osvdb.org/25746(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(cve@mitre.org)
http://www.securityfocus.com/bid/17955(cve@mitre.org)
http://www.trustix.org/errata/2006/0026(cve@mitre.org)
http://www.ubuntu.com/usn/usn-302-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2006/2554(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(cve@mitre.org)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(cve@mitre.org)
http://git.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=672e7cca17ed6036a1756ed34cf20dbd72d5e5f6(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20237(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20398(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20671(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20716(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/20914(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21045(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21476(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21745(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1097(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1103(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006-05-31.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/25746(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0493.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17955(af854a3a-2127-422b-91ae-364da2661108)
http://www.trustix.org/errata/2006/0026(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-302-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2554(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.