First published: Mon Oct 04 2010(Updated: )
Description of problem: When parsing a peer's supported HMAC authentication options in the sctp_auth_asoc_get_hmac() function, a malicious peer can craft their HMAC array in such a way as to cause memory corruption (out-of-bounds read followed by use of retrieved out-of-bounds data), which at the very least could cause a denial of service via kernel panic, and possibly worse. It appears this could be triggered remotely when connecting to a malicious peer, or locally by a user acting as both endpoints. In both cases, the "auth_enable" sysctl must be set in order to trigger the bug. References: <a href="http://marc.info/?l=oss-security&m=128619854321910&w=1">http://marc.info/?l=oss-security&m=128619854321910&w=1</a> <a href="http://marc.info/?l=linux-kernel&m=128596992418814&w=2">http://marc.info/?l=linux-kernel&m=128596992418814&w=2</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <2.6.36 | |
Fedoraproject Fedora | =13 | |
Debian Debian Linux | =5.0 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =9.04 | |
Canonical Ubuntu Linux | =9.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =6.06 | |
debian/linux-2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.