CVE-2013-2206 REJECTED

The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.

EPSS 3.21% · 86.9th percentile

Risk Scores

EPSS Score
3.21%
86.9th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-goldfish0, 3.4.0-4.26, 3.4.0-4.24
Ubuntu:14.04:LTSlinux-manta3.4.0-4.19, 0
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:14.04:LTSlinux-lts-utopic0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:14.04:LTSlinux0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-snapdragon0
Ubuntu:16.04:LTSlinux0
Ubuntu:16.04:LTSlinux-hwe0

Timeline

References

Open in Interactive Console →