7.1
CVSSv2

CVE-2014-5077

Published: 01/08/2014 Updated: 19/05/2023
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 633
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel up to and including 3.15.8, when SCTP authentication is enabled, allows remote malicious users to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

suse linux enterprise desktop 11

suse linux enterprise server 11

suse linux enterprise real time extension 11

redhat enterprise linux server aus 6.2

redhat enterprise linux server aus 6.5

redhat enterprise linux server tus 6.5

redhat enterprise linux eus 6.5

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

Vendor Advisories

Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
A NULL pointer dereference flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled simultaneous connections between the same hosts A remote attacker could use this flaw to crash the system ...