First published: Mon May 09 2011(Updated: )
Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.33.14 | |
Fedora | =14 | |
Fedora | =15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1770 is classified as a medium severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2011-1770, you should upgrade your Linux kernel to version 2.6.33.14 or later.
CVE-2011-1770 affects versions of the Linux kernel before 2.6.33.14, specifically on Debian and Fedora systems.
CVE-2011-1770 is an integer underflow vulnerability that can lead to a buffer over-read.
Yes, CVE-2011-1770 can be exploited remotely via specially crafted Datagram Congestion Control Protocol (DCCP) packets.