5
CVSSv2

CVE-2006-2934

Published: 30/06/2006 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 prior to 2.6.17.3 and 2.6.16 prior to 2.6.16.23 allows remote malicious users to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.16.16

linux linux kernel 2.6.17.2

linux linux kernel 2.6.16.18

linux linux kernel 2.6.16.13

linux linux kernel 2.6.16.15

linux linux kernel 2.6.16.1

linux linux kernel 2.6.17

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.21

linux linux kernel 2.6.17.1

linux linux kernel 2.6.16

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.10

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16.19

linux linux kernel 2.6.16.20

Vendor Advisories

A Denial of service vulnerability was reported in iptables’ SCTP conntrack module On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash (CVE-2006-2934) ...
A Denial of service vulnerability was reported in iptables’ SCTP conntrack module On computers which use this iptables module, a remote attacker could expoit this to trigger a kernel crash (CVE-2006-2934) ...

References

CWE-399https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197387http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.23http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.3http://www.securityfocus.com/bid/18755http://secunia.com/advisories/20917http://www.osvdb.org/26963https://issues.rpath.com/browse/RPL-488http://secunia.com/advisories/20986http://www.securityfocus.com/archive/1/439610/100/100/threadedhttp://www.kb.cert.org/vuls/id/717844http://www.novell.com/linux/security/advisories/2006_42_kernel.htmlhttp://secunia.com/advisories/21179http://secunia.com/advisories/21298http://www.redhat.com/support/errata/RHSA-2006-0575.htmlhttp://www.ubuntu.com/usn/usn-331-1http://www.novell.com/linux/security/advisories/2006_47_kernel.htmlhttp://secunia.com/advisories/21465http://secunia.com/advisories/21614http://www.ubuntu.com/usn/usn-346-1http://support.avaya.com/elmodocs2/security/ASA-2006-200.htmhttp://secunia.com/advisories/22417http://secunia.com/advisories/21934http://secunia.com/advisories/21498http://www.mandriva.com/security/advisories?name=MDKSA-2006:151http://www.vupen.com/english/advisories/2006/2623https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10932http://www.securityfocus.com/archive/1/439483/100/100/threadedhttp://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git%3Ba=commit%3Bh=9c48e1ea8cf8800cc5e2d39ccbb8b5ff9704f8e9https://nvd.nist.govhttps://usn.ubuntu.com/331-1/https://www.kb.cert.org/vuls/id/717844