First published: Mon Mar 01 2010(Updated: )
Description of problem: Reported by Ang Way Chuang, Mauro Carvalho informed Red Hat about a security issue in the ULE decapsulation code. ULE (Unidirectional Lightweight Encapsulation RFC 4326) decapsulation has a bug that causes endless loop when Payload Pointer of MPEG2-TS frame is 182 or 183. Anyone who sends malicious MPEG2-TS frame will cause the receiver of ULE SNDU to go into endless loop. Acknowledgements: Red Hat would like to thank Ang Way Chuang for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=2.6.33 | |
Debian Linux | =5.0 | |
<=2.6.33 | ||
=5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1086 has been classified with a moderate severity due to the potential for causing denial of service through an endless loop.
To fix CVE-2010-1086, users should upgrade to a later version of the Linux kernel that is not affected, beyond version 2.6.33.
CVE-2010-1086 affects Linux kernel versions up to and including 2.6.33 and Debian Linux version 5.0.
CVE-2010-1086 is a vulnerability in the ULE decapsulation code leading to a denial of service.
The vulnerability identified as CVE-2010-1086 was reported by Ang Way Chuang and subsequently informed to Red Hat by Mauro Carvalho.