CVE-2014-0101

Severity
7.8HIGH
EPSS
3.1%
top 13.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11
Latest updateMay 13

Description

The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.

CVSS vector

AV:N/AC:L/C:N/I:N/A:CExploitability: 10.0 | Impact: 6.9

Affected Packages24 packages

Also affects: Ubuntu Linux 10.04, Enterprise Linux 6.3, 6.4, 6.5

Patches

🔴Vulnerability Details

3
GHSA
GHSA-gcjx-xxq3-676c: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns2022-05-13
OSV
CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns2014-03-11
CVEList
CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns2014-03-11

📋Vendor Advisories

10
Ubuntu
Linux kernel (Saucy HWE) vulnerabilities2014-05-27
Ubuntu
Linux kernel (OMAP4) vulnerabilities2014-05-27
Ubuntu
Linux kernel (Quantal HWE) vulnerabilities2014-05-27
Ubuntu
Linux kernel vulnerabilities2014-05-27
Ubuntu
Linux kernel (Raring HWE) vulnerabilities2014-05-27

💬Community

2
Bugzilla
CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk [fedora-all]2014-03-03
Bugzilla
CVE-2014-0101 kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk2014-02-27
CVE-2014-0101 (HIGH CVSS 7.8) | The sctp_sf_do_5_1D_ce function in | cvebase.io