net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
2014-03-24T16:40:48.140
2025-04-12T10:46:40.837
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 3.2.57 | Yes |
Operating System | linux | linux_kernel | < 3.4.86 | Yes |
Operating System | linux | linux_kernel | < 3.10.36 | Yes |
Operating System | linux | linux_kernel | < 3.12.17 | Yes |
Operating System | linux | linux_kernel | < 3.13.9 | Yes |
Operating System | canonical | ubuntu_linux | 10.04 | Yes |