CVE-2014-2523
kernel: netfilter: nf_conntrack_dccp: incorrect skb_header_pointer API usages
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
net/netfilter/nf_conntrack_proto_dccp.c en el kernel de Linux hasta 3.13.6 utiliza un puntero de cabecera DCCP incorrectamente, lo que permite a atacantes remotos causar una denegación de servicio (caída de sistema) o posiblemente ejecutar código arbitrario a través de un paquete DCCP que provoca una llamada la función (1) dccp_new, (2) dccp_packet o (3) dccp_error.
The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. A flaw was found in the way the handle_rx() function handled large network packets when mergeable buffers were disabled. A privileged guest user could use this flaw to crash the host or corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-03-17 CVE Reserved
- 2014-03-24 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b22f5126a24b3b2f15448c3f2a254fc10cbc2b92 | X_refsource_confirm | |
http://secunia.com/advisories/57446 | Third Party Advisory | |
http://twitter.com/grsecurity/statuses/445496197399461888 | Broken Link | |
http://www.securityfocus.com/bid/66279 | Third Party Advisory | |
http://www.securitytracker.com/id/1029945 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91910 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/03/17/7 | 2023-11-07 | |
https://github.com/torvalds/linux/commit/b22f5126a24b3b2f15448c3f2a254fc10cbc2b92 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://www.ubuntu.com/usn/USN-2173-1 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2174-1 | 2023-11-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1077343 | 2014-06-04 | |
https://access.redhat.com/security/cve/CVE-2014-2523 | 2014-06-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 3.2.57 Search vendor "Linux" for product "Linux Kernel" and version " < 3.2.57" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.3 < 3.4.86 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.3 < 3.4.86" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.5 < 3.10.36 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.5 < 3.10.36" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.11 < 3.12.17 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 < 3.12.17" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.13.0 < 3.13.9 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13.0 < 3.13.9" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
|