Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html | Broken Link Exploit Patch |
http://lists.netsys.com/pipermail/full-disclosure/2004-May/021223.html | Broken Link |
http://marc.info/?l=bugtraq&m=108456230815842&w=2 | Mailing List Patch |
http://www.securityfocus.com/bid/10326 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16117 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2004-12-31 05:00
Updated : 2024-02-08 17:59
NVD link : CVE-2004-2013
Mitre link : CVE-2004-2013
CVE.ORG link : CVE-2004-2013
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound