Description
sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1681-1 | New Linux 2.6.24 packages fix several vulnerabilities |
Debian DSA |
DSA-1687-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2008-4556 | sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires. |
Ubuntu USN |
USN-679-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T10:24:20.645Z
Reserved: 2008-10-15T00:00:00.000Z
Link: CVE-2008-4576
No data.
Status : Modified
Published: 2008-10-15T20:07:42.810
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-4576
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN