Think you have a false positive on this rule?

Sid 1-7021

Message

OS-LINUX kernel SCTP chunkless packet denial of service attempt

Summary

SCTP conntrack (ipconntrackproto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.

Impact

CVSS base score 5.0 CVSS impact score 2.9 CVSS exploitability score 10.0 confidentialityImpact NONE integrityImpact NONE availabilityImpact NONE

CVE-2006-2934:

CVSS base score 5.0

CVSS impact score 2.9

CVSS exploitability score 10.0

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact PARTIAL

Detailed information

CVE-2006-2934: SCTP conntrack (ipconntrackproto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.

Affected systems

  • linux linux_kernel 2.6.16
  • linux linux_kernel 2.6.16.1
  • linux linux_kernel 2.6.16.2
  • linux linux_kernel 2.6.16.10
  • linux linux_kernel 2.6.16.11
  • linux linux_kernel 2.6.16.12
  • linux linux_kernel 2.6.16.13
  • linux linux_kernel 2.6.16.14
  • linux linux_kernel 2.6.16.15
  • linux linux_kernel 2.6.16.16
  • linux linux_kernel 2.6.16.17
  • linux linux_kernel 2.6.16.18
  • linux linux_kernel 2.6.16.19
  • linux linux_kernel 2.6.16.20
  • linux linux_kernel 2.6.16.21
  • linux linux_kernel 2.6.16.22
  • linux linux_kernel 2.6.17
  • linux linux_kernel 2.6.17.1
  • linux linux_kernel 2.6.17.2

Ease of attack

CVE-2006-2934:

Access Vector NETWORK

Access Complexity LOW

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References