Vulnerability Description
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 2.4.25 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.htmlBroken LinkExploitPatch
- http://lists.netsys.com/pipermail/full-disclosure/2004-May/021223.htmlBroken Link
- http://marc.info/?l=bugtraq&m=108456230815842&w=2Mailing ListPatch
- http://www.securityfocus.com/bid/10326Broken LinkThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16117Third Party AdvisoryVDB Entry
- http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.htmlBroken LinkExploitPatch
- http://lists.netsys.com/pipermail/full-disclosure/2004-May/021223.htmlBroken Link
- http://marc.info/?l=bugtraq&m=108456230815842&w=2Mailing ListPatch
- http://www.securityfocus.com/bid/10326Broken LinkThird Party AdvisoryVDB Entry
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16117Third Party AdvisoryVDB Entry
FAQ
What is CVE-2004-2013?
CVE-2004-2013 is a vulnerability with a CVSS score of 7.8 (HIGH). Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which caus...
How severe is CVE-2004-2013?
CVE-2004-2013 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2013?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.