First published: Mon Oct 06 2008(Updated: )
The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=2.6.25.14 | |
Linux kernel | =2.2.27 | |
Linux kernel | =2.4.36 | |
Linux kernel | =2.4.36.1 | |
Linux kernel | =2.4.36.2 | |
Linux kernel | =2.4.36.3 | |
Linux kernel | =2.4.36.4 | |
Linux kernel | =2.4.36.5 | |
Linux kernel | =2.4.36.6 | |
Linux kernel | =2.6 | |
Linux kernel | =2.6.18 | |
Linux kernel | =2.6.18-rc1 | |
Linux kernel | =2.6.18-rc2 | |
Linux kernel | =2.6.18-rc3 | |
Linux kernel | =2.6.18-rc4 | |
Linux kernel | =2.6.18-rc5 | |
Linux kernel | =2.6.18-rc6 | |
Linux kernel | =2.6.18-rc7 | |
Linux kernel | =2.6.19.4 | |
Linux kernel | =2.6.19.5 | |
Linux kernel | =2.6.19.6 | |
Linux kernel | =2.6.19.7 | |
Linux kernel | =2.6.20.16 | |
Linux kernel | =2.6.20.17 | |
Linux kernel | =2.6.20.18 | |
Linux kernel | =2.6.20.19 | |
Linux kernel | =2.6.20.20 | |
Linux kernel | =2.6.20.21 | |
Linux kernel | =2.6.21.5 | |
Linux kernel | =2.6.21.6 | |
Linux kernel | =2.6.21.7 | |
Linux kernel | =2.6.22 | |
Linux kernel | =2.6.22.2 | |
Linux kernel | =2.6.22.8 | |
Linux kernel | =2.6.22.9 | |
Linux kernel | =2.6.22.10 | |
Linux kernel | =2.6.22.11 | |
Linux kernel | =2.6.22.12 | |
Linux kernel | =2.6.22.13 | |
Linux kernel | =2.6.22.14 | |
Linux kernel | =2.6.22.15 | |
Linux kernel | =2.6.22.17 | |
Linux kernel | =2.6.22.18 | |
Linux kernel | =2.6.22.19 | |
Linux kernel | =2.6.22.20 | |
Linux kernel | =2.6.22.21 | |
Linux kernel | =2.6.22.22 | |
Linux kernel | =2.6.22_rc1 | |
Linux kernel | =2.6.22_rc7 | |
Linux kernel | =2.6.23 | |
Linux kernel | =2.6.23.8 | |
Linux kernel | =2.6.23.9 | |
Linux kernel | =2.6.23.10 | |
Linux kernel | =2.6.23.11 | |
Linux kernel | =2.6.23.12 | |
Linux kernel | =2.6.23.13 | |
Linux kernel | =2.6.23.15 | |
Linux kernel | =2.6.23.16 | |
Linux kernel | =2.6.23.17 | |
Linux kernel | =2.6.23_rc1 | |
Linux kernel | =2.6.24 | |
Linux kernel | =2.6.24.1 | |
Linux kernel | =2.6.24.2 | |
Linux kernel | =2.6.24.3 | |
Linux kernel | =2.6.24.4 | |
Linux kernel | =2.6.24.5 | |
Linux kernel | =2.6.24.6 | |
Linux kernel | =2.6.24.7 | |
Linux kernel | =2.6.24_rc1 | |
Linux kernel | =2.6.24_rc4 | |
Linux kernel | =2.6.24_rc5 | |
Linux kernel | =2.6.25 | |
Linux kernel | =2.6.25 | |
Linux kernel | =2.6.25.1 | |
Linux kernel | =2.6.25.1 | |
Linux kernel | =2.6.25.2 | |
Linux kernel | =2.6.25.2 | |
Linux kernel | =2.6.25.3 | |
Linux kernel | =2.6.25.3 | |
Linux kernel | =2.6.25.4 | |
Linux kernel | =2.6.25.4 | |
Linux kernel | =2.6.25.5 | |
Linux kernel | =2.6.25.5 | |
Linux kernel | =2.6.25.6 | |
Linux kernel | =2.6.25.6 | |
Linux kernel | =2.6.25.7 | |
Linux kernel | =2.6.25.7 | |
Linux kernel | =2.6.25.8 | |
Linux kernel | =2.6.25.8 | |
Linux kernel | =2.6.25.9 | |
Linux kernel | =2.6.25.9 | |
Linux kernel | =2.6.25.10 | |
Linux kernel | =2.6.25.10 | |
Linux kernel | =2.6.25.11 | |
Linux kernel | =2.6.25.11 | |
Linux kernel | =2.6.25.12 | |
Linux kernel | =2.6.25.12 | |
Linux kernel | =2.6.25.13 | |
Linux kernel | =2.6.25.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-4445 is rated as high due to the potential for security bypass or unauthorized access.
To fix CVE-2008-4445, update the Linux kernel to version 2.6.26.4 or later.
CVE-2008-4445 affects Linux kernel versions prior to 2.6.26.4, including 2.6.25.14 and earlier.
CVE-2008-4445 is a vulnerability in the Stream Control Transmission Protocol (SCTP) that involves improper verification of identifier indices.
Yes, there are indications that exploits exist for CVE-2008-4445, which may allow attackers to bypass security mechanisms.