Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-2634


It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.


Published

2018-07-27T19:29:00.580

Last Modified

2024-11-21T03:23:52.553

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-476
  • Type: Secondary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 2.6.22.17 Yes
Operating System redhat enterprise_linux_desktop 5.0 Yes
Operating System redhat enterprise_linux_server 5.0 Yes
Operating System redhat enterprise_linux_server_aus 5.6 Yes
Operating System redhat enterprise_linux_server_aus 5.9 Yes
Operating System redhat enterprise_linux_workstation 5.0 Yes

References