7.8
CVSSv2

CVE-2008-4618

Published: 21/10/2008 Updated: 07/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel prior to 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows malicious users to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.25.4

linux linux kernel 2.6.25.11

linux linux kernel 2.6.26

linux linux kernel 2.6.18

linux linux kernel 2.6.25.9

linux linux kernel 2.6.22.15

linux linux kernel 2.6.24.7

linux linux kernel 2.6.23.13

linux linux kernel 2.6.24.2

linux linux kernel 2.4.36.6

linux linux kernel 2.6.22.21

linux linux kernel 2.6.25.12

linux linux kernel 2.6.25.5

linux linux kernel 2.6.23.8

linux linux kernel 2.6.25

linux linux kernel 2.6.22.12

linux linux kernel 2.6.25.8

linux linux kernel 2.6.21.6

linux linux kernel 2.4.36.2

linux linux kernel 2.6.22.1

linux linux kernel 2.6.23.16

linux linux kernel 2.6.24.1

linux linux kernel 2.6.25.6

linux linux kernel 2.6.22

linux linux kernel 2.6.26.3

linux linux kernel 2.6.20.16

linux linux kernel 2.6.19.4

linux linux kernel 2.6.25.13

linux linux kernel 2.6.20.21

linux linux kernel 2.6.25.7

linux linux kernel 2.4.36.1

linux linux kernel 2.6.25.3

linux linux kernel 2.6.24

linux linux kernel 2.6.26.2

linux linux kernel 2.6.20.17

linux linux kernel 2.6.21.5

linux linux kernel 2.6.25.15

linux linux kernel 2.6.24_rc4

linux linux kernel 2.6.23.15

linux linux kernel 2.6.23.10

linux linux kernel 2.4.36.4

linux linux kernel 2.6.26.1

linux linux kernel 2.6.20.20

linux linux kernel 2.6.22.18

linux linux kernel 2.4.36.3

linux linux kernel 2.6.22.20

linux linux kernel 2.6.20.18

linux linux kernel 2.6.23.9

linux linux kernel 2.6.25.2

linux linux kernel 2.6.25.1

linux linux kernel 2.6.24.4

linux linux kernel 2.6.25.16

linux linux kernel 2.6.22.9

linux linux kernel 2.6.25.17

linux linux kernel 2.6.22.13

linux linux kernel 2.6.19.7

linux linux kernel 2.6.24.5

linux linux kernel 2.6.24_rc1

linux linux kernel 2.6.20.19

linux linux kernel 2.6.22.17

linux linux kernel 2.6.25.10

linux linux kernel 2.6.22.11

linux linux kernel 2.6.23

linux linux kernel 2.6.22.10

linux linux kernel 2.6.23.17

linux linux kernel 2.6.21.7

linux linux kernel 2.6.23_rc1

linux linux kernel 2.6.22.22

linux linux kernel 2.6.24.6

linux linux kernel 2.6.22_rc7

linux linux kernel 2.4.36

linux linux kernel 2.6.23.12

linux linux kernel 2.6.24_rc5

linux linux kernel 2.6.19.6

linux linux kernel 2.6.22.8

linux linux kernel 2.6.19.5

linux linux kernel 2.4.36.5

linux linux kernel

linux linux kernel 2.6.22.2

linux linux kernel 2.2.27

linux linux kernel 2.6.22.19

linux linux kernel 2.6.24.3

linux linux kernel 2.6.22_rc1

linux linux kernel 2.6.25.14

linux linux kernel 2.6.26.4

linux linux kernel 2.6.23.11

linux linux kernel 2.6.22.14

linux linux kernel 2.6

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and several bugsare now available for Red Hat Enterprise MRG 10This update has been rated as having important security impact by the RedHat Secur ...
It was discovered that the Xen hypervisor block driver did not correctly validate requests A user with root privileges in a guest OS could make a malicious IO request with a large number of blocks that would crash the host OS, leading to a denial of service This only affected Ubuntu 710 (CVE-2007-5498) ...