Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2014-0101

CVE information

Published

10 years ago

Last Modified

1 year ago

CVSSv2.0 Severity

High

Impact Analysis

Description

The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk..

CVSSv2.0 Score

Severity
High
Base Score
7.8/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
6.9/10
Confidentiality Impact
None
Availability Impact
Complete
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  Yes
2.6.24 3.2.56
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  Yes
3.3 3.4.84
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  Yes
3.5 3.10.34
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  Yes
3.11 3.12.15
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
  Yes
3.13 3.13.7
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
  Yes
- -
cpe:2.3:a:f5:big-iq_centralized_management:4.6.0:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:f5:big-iq_adc:4.5.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*
  Yes
4.0.0 -
cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*
  Yes
4.2.0 -
cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*
  Yes
4.0.0 -
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*
  Yes
11.4.0 -
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:
  Yes
11.3.0 -
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*
  Yes
11.3.0 -
cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:*
  Yes
2.1.0 -
cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:*
  Yes
3.0.0 -
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
  Yes
11.1.0 -
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
  Yes
11.1.0 -