6.1
CVSSv2

CVE-2007-2876

Published: 11/06/2007 Updated: 30/10/2018
CVSS v2 Base Score: 6.1 | Impact Score: 6.9 | Exploitability Score: 6.5
VMScore: 543
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 prior to 2.6.20.13, and 2.6.21.x prior to 2.6.21.4, allows remote malicious users to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.0

linux linux kernel 2.6.1

linux linux kernel 2.6.11.10

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11.9

linux linux kernel 2.6.12

linux linux kernel 2.6.12.1

linux linux kernel 2.6.12.6

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13.3

linux linux kernel 2.6.13

linux linux kernel 2.6.14.5

linux linux kernel 2.6.14.6

linux linux kernel 2.6.11

linux linux kernel 2.6.11.1

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.7

linux linux kernel 2.6.10

linux linux kernel 2.6.11.3

linux linux kernel 2.6.11.4

linux linux kernel 2.6.11.5

linux linux kernel 2.6.12.22

linux linux kernel 2.6.12.3

linux linux kernel 2.6.14.1

linux linux kernel 2.6.14.2

linux linux kernel 2.6.14

linux linux kernel 2.6.15.4

linux linux kernel 2.6.15.5

linux linux kernel 2.6.15

linux linux kernel 2.6.16.14

linux linux kernel 2.6.16.15

linux linux kernel 2.6.16.21

linux linux kernel 2.6.16.22

linux linux kernel 2.6.16.29

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.37

linux linux kernel 2.6.16.38

linux linux kernel 2.6.16.7

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16

linux linux kernel 2.6.16_rc7

linux linux kernel 2.6.17

linux linux kernel 2.6.17.2

linux linux kernel 2.6.17.3

linux linux kernel 2.6.18.3

linux linux kernel 2.6.18.4

linux linux kernel 2.6.18

linux linux kernel 2.6.19

linux linux kernel 2.6.20.10

linux linux kernel 2.6.20.11

linux linux kernel 2.6.20.5

linux linux kernel 2.6.20.6

linux linux kernel 2.6.21.3

linux linux kernel 2.6.21

linux linux kernel 2.6.3

linux linux kernel 2.6.5

linux linux kernel 2.6.7

linux linux kernel 2.6.8

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.11_rc1_bk6

linux linux kernel 2.6.12.4

linux linux kernel 2.6.12.5

linux linux kernel 2.6.13.1

linux linux kernel 2.6.14.3

linux linux kernel 2.6.14.4

linux linux kernel 2.6.15.6

linux linux kernel 2.6.15.7

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.23

linux linux kernel 2.6.16.24

linux linux kernel 2.6.16.30

linux linux kernel 2.6.16.31

linux linux kernel 2.6.16.32

linux linux kernel 2.6.16.39

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.9

linux linux kernel 2.6.17.1

linux linux kernel 2.6.17.10

linux linux kernel 2.6.17.4

linux linux kernel 2.6.17.5

linux linux kernel 2.6.18.5

linux linux kernel 2.6.18.6

linux linux kernel 2.6.2

linux linux kernel 2.6.20.12

linux linux kernel 2.6.20.13

linux linux kernel 2.6.20.7

linux linux kernel 2.6.20.8

linux linux kernel 2.6.9

linux linux kernel 2.6.15.1

linux linux kernel 2.6.15.11

linux linux kernel 2.6.16.1

linux linux kernel 2.6.16.10

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.18

linux linux kernel 2.6.16.19

linux linux kernel 2.6.16.25

linux linux kernel 2.6.16.26

linux linux kernel 2.6.16.33

linux linux kernel 2.6.16.34

linux linux kernel 2.6.16.40

linux linux kernel 2.6.16.41

linux linux kernel 2.6.17.11

linux linux kernel 2.6.17.12

linux linux kernel 2.6.17.6

linux linux kernel 2.6.17.7

linux linux kernel 2.6.19.1

linux linux kernel 2.6.19.2

linux linux kernel 2.6.20.14

linux linux kernel 2.6.20.2

linux linux kernel 2.6.20.9

linux linux kernel 2.6.4

linux linux kernel 2.6.6

linux linux kernel 2.6.8.1

linux linux kernel 2.6.8.1.5

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11.2

linux linux kernel 2.6.12.12

linux linux kernel 2.6.12.2

linux linux kernel 2.6.13.4

linux linux kernel 2.6.13.5

linux linux kernel 2.6.14.7

linux linux kernel 2.6.15.2

linux linux kernel 2.6.15.3

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.13

linux linux kernel 2.6.16.2

linux linux kernel 2.6.16.20

linux linux kernel 2.6.16.27

linux linux kernel 2.6.16.28

linux linux kernel 2.6.16.35

linux linux kernel 2.6.16.36

linux linux kernel 2.6.16.5

linux linux kernel 2.6.16.6

linux linux kernel 2.6.17.13

linux linux kernel 2.6.17.14

linux linux kernel 2.6.17.8

linux linux kernel 2.6.17.9

linux linux kernel 2.6.18.1

linux linux kernel 2.6.18.2

linux linux kernel 2.6.19.3

linux linux kernel 2.6.20

linux linux kernel 2.6.20.1

linux linux kernel 2.6.20.3

linux linux kernel 2.6.20.4

linux linux kernel 2.6.21.1

linux linux kernel 2.6.21.2

Vendor Advisories

Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1353 Ilja van Sprundel discovered that kernel memory could be leaked via the Bluetooth setsoc ...
A flaw was discovered in the PPP over Ethernet implementation Local attackers could manipulate ioctls and cause kernel memory consumption leading to a denial of service (CVE-2007-2525) ...
The compat_sys_mount function allowed local users to cause a denial of service when mounting a smbfs filesystem in compatibility mode (CVE-2006-7203) ...
A flaw was discovered in dvb ULE decapsulation A remote attacker could send a specially crafted message and cause a denial of service (CVE-2006-4623) ...

References

NVD-CWE-Otherhttp://marc.info/?l=linux-kernel&m=118128610219959&w=2http://marc.info/?l=linux-kernel&m=118128622431272&w=2http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4http://support.avaya.com/elmodocs2/security/ASA-2007-287.htmhttp://www.debian.org/security/2007/dsa-1356http://www.mandriva.com/security/advisories?name=MDKSA-2007:171http://www.mandriva.com/security/advisories?name=MDKSA-2007:196http://rhn.redhat.com/errata/RHSA-2007-0488.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0705.htmlhttp://www.novell.com/linux/security/advisories/2007_43_kernel.htmlhttp://www.novell.com/linux/security/advisories/2007_51_kernel.htmlhttp://www.novell.com/linux/security/advisories/2007_53_kernel.htmlhttp://www.ubuntu.com/usn/usn-486-1http://www.ubuntu.com/usn/usn-489-1http://www.ubuntu.com/usn/usn-510-1http://www.securityfocus.com/bid/24376http://secunia.com/advisories/25838http://secunia.com/advisories/25961http://secunia.com/advisories/26133http://secunia.com/advisories/26139http://secunia.com/advisories/26289http://secunia.com/advisories/26450http://secunia.com/advisories/26760http://secunia.com/advisories/26620http://secunia.com/advisories/26664http://secunia.com/advisories/27227http://www.vupen.com/english/advisories/2007/2105http://osvdb.org/37112https://exchange.xforce.ibmcloud.com/vulnerabilities/34777https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116https://nvd.nist.govhttps://www.debian.org/security/./dsa-1356https://usn.ubuntu.com/510-1/