First published: Tue May 09 2006(Updated: )
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (deadlock) via a large number of small messages to a receiver application that cannot process the messages quickly enough, which leads to "spillover of the receive buffer."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Stream Control Transmission Protocol (SCTP) | =2.6.16 | |
Stream Control Transmission Protocol (SCTP) | <2.6.17 | |
Ubuntu | =5.04 | |
Ubuntu | =5.10 | |
Ubuntu | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2275 has a severity rating that indicates it could lead to a denial of service due to system deadlock.
To fix CVE-2006-2275, upgrade to a version of SCTP that is later than 2.6.17.
CVE-2006-2275 affects SCTP implementations in Linux kernel versions up to 2.6.17 and specific Ubuntu Linux versions such as 5.04, 5.10, and 6.06.
The implications of CVE-2006-2275 include the potential for remote attackers to disrupt services by causing deadlock through overwhelming message sending.
CVE-2006-2275 was identified as a vulnerability in the SCTP implementation of the Linux kernel.