CVE-2014-0101
Summary
| CVE | CVE-2014-0101 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-03-11 13:01:00 UTC |
| Updated | 2023-02-13 00:32:00 UTC |
| Description | The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. |
Risk And Classification
Problem Types: CWE-476
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 10.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 10.04 | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | All | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | All | All | All | All |
| Application | F5 | Big-ip Analytics | All | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | All | All | All | All |
| Application | F5 | Big-ip Application Security Manager | All | All | All | All |
| Application | F5 | Big-ip Edge Gateway | All | All | All | All |
| Application | F5 | Big-ip Enterprise Manager | All | All | All | All |
| Application | F5 | Big-ip Enterprise Manager | All | All | All | All |
| Application | F5 | Big-ip Global Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Link Controller | All | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | All | All | All | All |
| Application | F5 | Big-ip Protocol Security Module | All | All | All | All |
| Application | F5 | Big-ip Wan Optimization Manager | All | All | All | All |
| Application | F5 | Big-ip Webaccelerator | All | All | All | All |
| Application | F5 | Big-iq Adc | 4.5.0 | All | All | All |
| Application | F5 | Big-iq Adc | 4.5.0 | All | All | All |
| Application | F5 | Big-iq Centralized Management | 4.6.0 | All | All | All |
| Application | F5 | Big-iq Centralized Management | 4.6.0 | All | All | All |
| Application | F5 | Big-iq Cloud | All | All | All | All |
| Application | F5 | Big-iq Device | All | All | All | All |
| Application | F5 | Big-iq Security | All | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 6.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 6.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 6.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 6.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 6.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Eus | 6.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 6.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 6.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 6.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 6.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 6.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 6.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| kernel/git/torvalds/linux.git - Linux kernel source tree | CONFIRM | git.kernel.org | Patch, Vendor Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| USN-2174-1: Linux kernel (EC2) vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | Third Party Advisory |
| support.f5.com/kb/en-us/solutions/public/15000/300/sol15317.html | CONFIRM | support.f5.com | Third Party Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| access.redhat.com | CVE-2014-0101 | MISC | access.redhat.com | |
| oss-security - CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk | MLIST | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| git.kernel.org | MISC | git.kernel.org | |
| Linux Kernel CVE-2014-0101 NULL Pointer Dereference Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Bug 1070705 – CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk | CONFIRM | bugzilla.redhat.com | Issue Tracking, Patch, Third Party Advisory |
| Security Advisory SA59216 - F5 Multiple Products Linux Kernel SCTP Handshake NULL Pointer Dereference Vulnerability - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| USN-2173-1: Linux kernel vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | Third Party Advisory |
| net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable · torvalds/linux@ec0223e · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.