Upstream information
Description
The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| National Vulnerability Database | |
|---|---|
| Base Score | 5 | 
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P | 
| Access Vector | Network | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | None | 
| Integrity Impact | None | 
| Availability Impact | Partial | 
SUSE Security Advisories:
- SUSE-SA:2006:028, published Wed, 31 May 2006 18:00:00 +0000
 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 02:05:54 2013CVE page last modified: Fri Dec 8 16:15:31 2023