The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T10:24:21.123Z
Reserved: 2008-10-20T00:00:00
Link: CVE-2008-4618

No data.

Status : Modified
Published: 2008-10-21T00:10:53.977
Modified: 2024-11-21T00:52:07.133
Link: CVE-2008-4618
