Vigil@nce: Linux kernel, denial of service of SCTP
October 2008 by Vigil@nce
A local attacker can stop the system via SCTP-AUTH.
– Gravity: 1/4
– Consequences: denial of service of computer
– Provenance: user shell
– Means of attack: no proof of concept, no attack
– Ability of attacker: expert (4/4)
– Confidence: confirmed by the editor (5/5)
– Diffusion of the vulnerable configuration: high (3/3)
– Creation date: 08/10/2008
IMPACTED PRODUCTS
– Linux kernel
DESCRIPTION
The SCTP protocol (Stream Control Transmission Protocol) creates
associations to send several streams. The draft-ietf-tsvwg-sctp-auth-08
draft defines the AUTH extension containing HMAC authentication
data.
The CVE-2008-3792 vulnerability of the VIGILANCE-VUL-8104
(https://vigilance.aql.fr/tree/1/8104) sheet was not fully
corrected. A SCTP-AUTH INIT-ACK packet forces the usage of an
invalid pointer, which stops the system.
An attacker can therefore create a denial of service on computers
with SCTP enabled, but SCTP-AUTH inactive.
CHARACTERISTICS
– Identifiers: VIGILANCE-VUL-8154
– Url: http://vigilance.aql.fr/vulnerability/8154