Vulnerability Description
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 2.6.38 |
| Redhat | Enterprise Linux Aus | 5.6 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 5.6 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Workstation | 5.0 |
Related Weaknesses (CWE)
References
- http://downloads.avaya.com/css/P8/documents/100145416Third Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://openwall.com/lists/oss-security/2011/03/08/19Mailing ListPatchThird Party Advisory
- http://openwall.com/lists/oss-security/2011/03/08/4Mailing ListPatchThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-0833.htmlThird Party Advisory
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38Broken Link
- http://www.securityfocus.com/bid/46793Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=682954Issue TrackingPatchThird Party Advisory
- http://downloads.avaya.com/css/P8/documents/100145416Third Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://openwall.com/lists/oss-security/2011/03/08/19Mailing ListPatchThird Party Advisory
- http://openwall.com/lists/oss-security/2011/03/08/4Mailing ListPatchThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-0833.htmlThird Party Advisory
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38Broken Link
- http://www.securityfocus.com/bid/46793Third Party AdvisoryVDB Entry
FAQ
What is CVE-2011-1093?
CVE-2011-1093 is a vulnerability with a CVSS score of 7.8 (HIGH). The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSE...
How severe is CVE-2011-1093?
CVE-2011-1093 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1093?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux Aus, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server.