CVE-2015-5283

CVSS V2 Medium 4.7 CVSS V3 None
Description
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
Overview
  • CVE ID
  • CVE-2015-5283
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2015-10-19T10:59:03
  • Last Modified Date
  • 2023-02-13T00:52:54
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 4.2.2
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:M/Au:N/C:N/I:N/A:C
  • Access Vector
  • LOCAL
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 4.7
  • Severity
  • MEDIUM
  • Exploitability Score
  • 3.4
  • Impact Score
  • 6.9
History
Created Old Value New Value Data Type Notes
2022-05-10 09:57:35 Added to TrackCVE
2022-12-02 06:49:52 2015-10-19T10:59Z 2015-10-19T10:59:03 CVE Published Date updated
2022-12-02 06:49:52 2016-12-08T03:09:57 CVE Modified Date updated
2022-12-02 06:49:52 Modified Vulnerability Status updated
2023-02-02 23:05:10 2023-02-02T21:15:16 CVE Modified Date updated
2023-02-02 23:05:10 The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished. A NULL pointer dereference flaw was found in the SCTP implementation. A local user could use this flaw to cause a denial of service on the system by triggering a kernel panic when creating multiple sockets in parallel while the system did not have the SCTP module loaded. Description updated
2023-02-02 23:05:11 References updated
2023-02-13 01:06:11 2023-02-13T00:52:54 CVE Modified Date updated
2023-02-13 01:06:11 A NULL pointer dereference flaw was found in the SCTP implementation. A local user could use this flaw to cause a denial of service on the system by triggering a kernel panic when creating multiple sockets in parallel while the system did not have the SCTP module loaded. The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished. Description updated