First published: Thu Aug 29 2013(Updated: )
The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =8.3 | |
FreeBSD Kernel | =9.0 | |
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.1-p4 | |
FreeBSD Kernel | =9.1-p5 | |
FreeBSD Kernel | =9.2-prerelease |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5209 is classified as a medium severity vulnerability.
To fix CVE-2013-5209, update your FreeBSD system to the latest version that includes the security patch.
CVE-2013-5209 affects FreeBSD versions 8.3 through 9.2-PRERELEASE.
CVE-2013-5209 is a vulnerability in the SCTP implementation that may allow information disclosure from the kernel stack.
Yes, CVE-2013-5209 can be exploited remotely by attackers to obtain sensitive information.