CVE-2014-5077

CVSS V2 High 7.1 CVSS V3 None
Description
The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
Overview
  • CVE ID
  • CVE-2014-5077
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-08-01T11:13:09
  • Last Modified Date
  • 2023-02-13T00:42:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 3.15.8
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.1
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.9
References
Reference URL Reference Tags
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1be9a950c646c9092fb3618197f7b6bfb50e82aa
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1083.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1668.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1763.html Third Party Advisory
http://secunia.com/advisories/60430 Third Party Advisory
http://secunia.com/advisories/60545 Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/07/26/1 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/68881 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1030681 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2334-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2335-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2358-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2359-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2014:1083
https://access.redhat.com/errata/RHSA-2014:1392
https://access.redhat.com/errata/RHSA-2014:1668
https://access.redhat.com/errata/RHSA-2014:1724
https://access.redhat.com/errata/RHSA-2014:1763
https://access.redhat.com/errata/RHSA-2014:1872
https://access.redhat.com/security/cve/CVE-2014-5077
https://bugzilla.redhat.com/show_bug.cgi?id=1122982 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/95134 Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa Patch Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:22:28 Added to TrackCVE
2022-12-02 00:08:17 2014-08-01T11:13Z 2014-08-01T11:13:09 CVE Published Date updated
2022-12-02 00:08:17 2020-08-13T16:27:34 CVE Modified Date updated
2022-12-02 00:08:17 Analyzed Vulnerability Status updated
2023-02-02 21:04:20 2023-02-02T20:18:32 CVE Modified Date updated
2023-02-02 21:04:20 Analyzed Modified Vulnerability Status updated
2023-02-02 21:04:20 The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction. A NULL pointer dereference flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled simultaneous connections between the same hosts. A remote attacker could use this flaw to crash the system. Description updated
2023-02-02 21:04:28 References updated
2023-02-13 01:05:01 2023-02-13T00:42:17 CVE Modified Date updated
2023-02-13 01:05:02 A NULL pointer dereference flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled simultaneous connections between the same hosts. A remote attacker could use this flaw to crash the system. The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction. Description updated