First published: Wed May 03 2006(Updated: )
The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.16.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1527 has a severity rating of medium, as it can lead to a denial of service condition.
To fix CVE-2006-1527, you should upgrade the Linux kernel to version 2.6.16.13 or later.
CVE-2006-1527 affects Linux kernel versions prior to 2.6.16.13, particularly 2.6.16.12.
CVE-2006-1527 is a denial of service vulnerability caused by improper handling of SCTP chunk sizes.
Yes, CVE-2006-1527 can be exploited remotely by attackers to trigger an infinite loop.