The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2014-03-11 13:01
Updated : 2025-04-12 10:46
NVD link : CVE-2014-0101
Mitre link : CVE-2014-0101
CVE.ORG link : CVE-2014-0101
JSON object : View
Products Affected
f5
- big-ip_protocol_security_module
- big-iq_device
- big-ip_advanced_firewall_manager
- big-ip_global_traffic_manager
- big-ip_webaccelerator
- big-ip_application_security_manager
- big-ip_application_acceleration_manager
- big-iq_cloud
- big-ip_link_controller
- big-ip_local_traffic_manager
- big-ip_enterprise_manager
- big-iq_security
- big-iq_adc
- big-ip_analytics
- big-ip_edge_gateway
- big-iq_centralized_management
- big-ip_wan_optimization_manager
- big-ip_policy_enforcement_manager
- big-ip_access_policy_manager
redhat
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_server
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-476
NULL Pointer Dereference