First published: Tue May 09 2006(Updated: )
The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lksctp Lksctp | =2.6.0_test1_0.7.2 | |
Lksctp Lksctp | =2.6.2_0.9.0 | |
Lksctp Lksctp | =2.6.15_1.0.5 | |
Lksctp Lksctp | =2.6.0_test4_0.7.3 | |
Lksctp Lksctp | =2.6.13_1.0.3 | |
Lksctp Lksctp | =2.6.16_1.0.6 | |
Lksctp Lksctp | =2.6.10_1.0.2 | |
Lksctp Lksctp | =2.6.6_1.0.1 | |
Lksctp Lksctp | =2.6.14_1.0.4 | |
Lksctp Lksctp | =2.6.3_1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2271 has been classified as a denial of service vulnerability that can lead to a kernel panic.
To fix CVE-2006-2271, you should update Linux SCTP to version 2.6.17 or later.
CVE-2006-2271 affects various versions of Linux SCTP, specifically versions before 2.6.17.
Yes, CVE-2006-2271 can be exploited by remote attackers through unexpected ECNE chunks.
The impact of CVE-2006-2271 is a denial of service, resulting in the crashing of the system's kernel.