The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel prior to 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote malicious users to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
fedoraproject fedora 13 |
||
debian debian linux 5.0 |
||
canonical ubuntu linux 10.10 |
||
canonical ubuntu linux 9.04 |
||
canonical ubuntu linux 9.10 |
||
canonical ubuntu linux 8.04 |
||
canonical ubuntu linux 10.04 |
||
canonical ubuntu linux 6.06 |