Linux Kernel 'SCTP_GET_ASSOC_STATS()' Stack-Based Buffer Overflow Vulnerability
BID:58389
Info
Linux Kernel 'SCTP_GET_ASSOC_STATS()' Stack-Based Buffer Overflow Vulnerability
| Bugtraq ID: | 58389 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2013-1828 |
| Remote: | No |
| Local: | Yes |
| Published: | Mar 07 2013 12:00AM |
| Updated: | May 07 2015 05:10PM |
| Credit: | Petr Matousek |
| Vulnerable: |
Linux kernel |
| Not Vulnerable: | |
Discussion
Linux Kernel 'SCTP_GET_ASSOC_STATS()' Stack-Based Buffer Overflow Vulnerability
Linux Kernel is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input.
Local attackers may exploit this vulnerability to gain elevated privileges or cause a denial of service.
Linux Kernel is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input.
Local attackers may exploit this vulnerability to gain elevated privileges or cause a denial of service.
Exploit / POC
Linux Kernel 'SCTP_GET_ASSOC_STATS()' Stack-Based Buffer Overflow Vulnerability
The following exploit code is available:
The following exploit code is available:
Solution / Fix
Linux Kernel 'SCTP_GET_ASSOC_STATS()' Stack-Based Buffer Overflow Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.
References
Linux Kernel 'SCTP_GET_ASSOC_STATS()' Stack-Based Buffer Overflow Vulnerability
References:
References:
- CVE-2013-1828 kernel: sctp: SCTP_GET_ASSOC_STATS stack buffer overflow (Bugzilla)
- Linux kernel Homepage (kernel.org)
- net/sctp: Validate parameter size for SCTP_GET_ASSOC_STATS (Guenter Roeck)
- sctp: Add support to per-association statistics via a new SCTP_GET_ASSOC_STATS c (Michele Baldessari)