Linux.Kernel.Sctp_process_unk_param.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a buffer-overflow vulnerability in the Linux kernel.
The vulnerability is caused by an error when the sctp_process_unk_param function in net/sctp/sm_make_chunk.c handles a specially crafted SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data. It allows a remote attacker to compromise a vulnerable system.

affected-products-logoAffected Products

Linux kernel 2.6.33 and previous versions

Impact logoImpact

Denial of service

recomended-action-logoRecommended Actions

Contact your vendor for upgrade or patch information.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-12-16 19.220 Sig Added
2021-01-14 17.000 Sig Added
2021-01-14 16.998 Sig Added