First published: Wed Oct 15 2008(Updated: )
sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.25.4 | |
Linux Kernel | =2.6.25.11 | |
Linux Kernel | =2.6.18-rc3 | |
Linux Kernel | =2.6.25.9 | |
Linux Kernel | =2.6.22.15 | |
Linux Kernel | =2.6.24.7 | |
Linux Kernel | =2.6.18-rc2 | |
Linux Kernel | =2.6.23.13 | |
Linux Kernel | =2.6.24.2 | |
Linux Kernel | =2.4.36.6 | |
Linux Kernel | =2.6.18-rc5 | |
Linux Kernel | =2.6.18-rc4 | |
Linux Kernel | =2.6.22.21 | |
Linux Kernel | =2.6.25.12 | |
Linux Kernel | =2.6.25.5 | |
Linux Kernel | =2.6.23.8 | |
Linux Kernel | =2.6.22.12 | |
Linux Kernel | =2.6.25.8 | |
Linux Kernel | =2.6.21.6 | |
Linux Kernel | =2.4.36.2 | |
Linux Kernel | =2.6.22.1 | |
Linux Kernel | =2.6.23.16 | |
Linux Kernel | =2.6.24.1 | |
Linux Kernel | =2.6.25.6 | |
Linux Kernel | =2.6.22 | |
Linux Kernel | =2.6.20.16 | |
Linux Kernel | =2.6.25.9 | |
Linux Kernel | =2.6.19.4 | |
Linux Kernel | =2.6.25.13 | |
Linux Kernel | =2.6.20.21 | |
Linux Kernel | =2.6.25.7 | |
Linux Kernel | =2.4.36.1 | |
Linux Kernel | =2.6.25.3 | |
Linux Kernel | =2.6.24 | |
Linux Kernel | =2.6.20.17 | |
Linux Kernel | =2.6.21.5 | |
Linux Kernel | =2.6.25.15 | |
Linux Kernel | =2.6.24_rc4 | |
Linux Kernel | =2.6.23.15 | |
Linux Kernel | =2.6.23.10 | |
Linux Kernel | <=2.6.25.17 | |
Linux Kernel | =2.4.36.4 | |
Linux Kernel | =2.6.20.20 | |
Linux Kernel | =2.6.22.18 | |
Linux Kernel | =2.6.25.8 | |
Linux Kernel | =2.4.36.3 | |
Linux Kernel | =2.6.22.20 | |
Linux Kernel | =2.6.20.18 | |
Linux Kernel | =2.6.23.9 | |
Linux Kernel | =2.6.25.2 | |
Linux Kernel | =2.6.25.1 | |
Linux Kernel | =2.6.24.4 | |
Linux Kernel | =2.6.25.16 | |
Linux Kernel | =2.6.22.9 | |
Linux Kernel | =2.6.22.13 | |
Linux Kernel | =2.6.19.7 | |
Linux Kernel | =2.6.24.5 | |
Linux Kernel | =2.6.24_rc1 | |
Linux Kernel | =2.6.20.19 | |
Linux Kernel | =2.6.22.17 | |
Linux Kernel | =2.6.25.10 | |
Linux Kernel | =2.6.22.11 | |
Linux Kernel | =2.6.23 | |
Linux Kernel | =2.6.22.10 | |
Linux Kernel | =2.6.23.17 | |
Linux Kernel | =2.6.25.1 | |
Linux Kernel | =2.6.25.4 | |
Linux Kernel | =2.6.25.3 | |
Linux Kernel | =2.6.21.7 | |
Linux Kernel | =2.6.23_rc1 | |
Linux Kernel | =2.6.22.22 | |
Linux Kernel | =2.6.18-rc7 | |
Linux Kernel | =2.6.25.5 | |
Linux Kernel | =2.6.24.6 | |
Linux Kernel | =2.6.22_rc7 | |
Linux Kernel | =2.4.36 | |
Linux Kernel | =2.6.23.12 | |
Linux Kernel | =2.6.24_rc5 | |
Linux Kernel | =2.6.19.6 | |
Linux Kernel | =2.6.25.11 | |
Linux Kernel | =2.6.18-rc6 | |
Linux Kernel | =2.6.22.8 | |
Linux Kernel | =2.6.19.5 | |
Linux Kernel | =2.6.18 | |
Linux Kernel | =2.4.36.5 | |
Linux Kernel | =2.6.22.2 | |
Linux Kernel | =2.2.27 | |
Linux Kernel | =2.6.22.19 | |
Linux Kernel | =2.6.24.3 | |
Linux Kernel | =2.6.22_rc1 | |
Linux Kernel | =2.6.25 | |
Linux Kernel | =2.6.25.2 | |
Linux Kernel | =2.6.25.7 | |
Linux Kernel | =2.6.25.14 | |
Linux Kernel | =2.6.25.12 | |
Linux Kernel | =2.6.25.6 | |
Linux Kernel | =2.6.18-rc1 | |
Linux Kernel | =2.6.23.11 | |
Linux Kernel | =2.6.22.14 | |
Linux Kernel | =2.6.25.10 | |
Linux Kernel | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4576 has a severity level categorized as high due to its potential to cause remote denial of service.
To fix CVE-2008-4576, upgrade to Linux kernel version 2.6.25.18 or later to mitigate the vulnerability.
CVE-2008-4576 affects the SCTP (Stream Control Transmission Protocol) component within specific versions of the Linux kernel.
An attacker can exploit CVE-2008-4576 to send a malicious INIT-ACK message, leading to a denial of service.
There have been reports of exploitation attempts leveraging CVE-2008-4576, emphasizing the need for immediate mitigation.