The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4163 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.
This issue affects the version of the kernel package as shipped with Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise MRG 2 may address this issue.
Base Score | 4.9 |
---|---|
Base Metrics | AV:L/AC:L/Au:N/C:N/I:N/A:C |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2013:1264 | 2013-09-16 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | kernel | Not affected |
Red Hat Enterprise Linux 6 | kernel | Not affected |
Red Hat Enterprise Linux 5 | kernel | Not affected |