CVE-2011-1573
kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data.
net/sctp/sm_make_chunk.c del kernel de Linux en versiones anteriores a 2.6.34, si se utiliza addip_enable y auth_enable, no considera la cantidad de "padding" durante el cálculo de la longitud para los segmentos ("chunks")(1) INIT y (2) INIT ACK, lo que permite a atacantes remotos provocar una denegación de servicio (OOPS) a través de paquetes modificados.
It was discovered that the /proc filesystem did not correctly handle permission changes when programs executed. A local attacker could hold open files to examine details about programs running with higher privileges, potentially increasing the chances of exploiting additional vulnerabilities. Vasiliy Kulikov discovered that the Bluetooth stack did not correctly clear memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-04-05 CVE Reserved
- 2011-07-15 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-682: Incorrect Calculation
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8170c35e738d62e9919ce5b109cf4ed66e95bde | X_refsource_confirm | |
http://mirror.anl.gov/pub/linux/kernel/v2.6/ChangeLog-2.6.34 | Broken Link |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=695383 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://openwall.com/lists/oss-security/2011/04/11/12 | 2023-02-13 | |
http://openwall.com/lists/oss-security/2011/04/11/4 | 2023-02-13 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2011-0927.html | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2011-1573 | 2011-07-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.34 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.34" | - |
Affected
|