The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
2010-11-26T20:00:02.297
2025-04-11T00:51:21.963
Deferred
CVSSv2: 8.3 (HIGH)
AV:A/AC:L/Au:N/C:C/I:C/A:C
6.5
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 2.6.36 | Yes |
Operating System | fedoraproject | fedora | 13 | Yes |
Operating System | debian | debian_linux | 5.0 | Yes |
Operating System | canonical | ubuntu_linux | 6.06 | Yes |
Operating System | canonical | ubuntu_linux | 8.04 | Yes |
Operating System | canonical | ubuntu_linux | 9.04 | Yes |
Operating System | canonical | ubuntu_linux | 9.10 | Yes |
Operating System | canonical | ubuntu_linux | 10.04 | Yes |
Operating System | canonical | ubuntu_linux | 10.10 | Yes |