Vulnerability Description
The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.8, < 3.8.4 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Vendor Advisory
- http://grsecurity.net/~spender/sctp.cExploitThird Party Advisory
- http://twitter.com/grsecurity/statuses/309805924749541376Third Party Advisory
- http://www.exploit-db.com/exploits/24747Third Party AdvisoryVDB Entry
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4Vendor Advisory
- http://www.openwall.com/lists/oss-security/2013/03/08/2Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=919315Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0fExploitPatchThird Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Vendor Advisory
- http://grsecurity.net/~spender/sctp.cExploitThird Party Advisory
- http://twitter.com/grsecurity/statuses/309805924749541376Third Party Advisory
- http://www.exploit-db.com/exploits/24747Third Party AdvisoryVDB Entry
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4Vendor Advisory
- http://www.openwall.com/lists/oss-security/2013/03/08/2Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=919315Issue TrackingThird Party Advisory
FAQ
What is CVE-2013-1828?
CVE-2013-1828 is a vulnerability with a CVSS score of 6.9 (MEDIUM). The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users ...
How severe is CVE-2013-1828?
CVE-2013-1828 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1828?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.