SB2008090301 - NULL pointer dereference in Linux kernel sctp



SB2008090301 - NULL pointer dereference in Linux kernel sctp

Published: September 3, 2008

Security Bulletin ID SB2008090301
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) NULL pointer dereference (CVE-ID: CVE-2008-3792)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sctp_setsockopt_auth_chunk(), sctp_setsockopt_hmac_ident(), sctp_setsockopt_auth_key(), sctp_setsockopt_active_key(), sctp_setsockopt_del_key(), sctp_getsockopt_maxburst(), sctp_getsockopt_active_key(), sctp_getsockopt_peer_auth_chunks() and sctp_getsockopt_local_auth_chunks() functions in net/sctp/socket.c, within the sctp_endpoint_init() function in net/sctp/endpointola.c. A remote non-authenticated attacker can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.