Vulnerability Description
The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 3.0 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://rhn.redhat.com/errata/RHSA-2013-1490.html
- http://www.openwall.com/lists/oss-security/2013/09/13/3Patch
- http://www.ubuntu.com/usn/USN-2019-1
- http://www.ubuntu.com/usn/USN-2021-1
- http://www.ubuntu.com/usn/USN-2022-1
- http://www.ubuntu.com/usn/USN-2024-1
- http://www.ubuntu.com/usn/USN-2038-1
- http://www.ubuntu.com/usn/USN-2039-1
- http://www.ubuntu.com/usn/USN-2041-1
- http://www.ubuntu.com/usn/USN-2045-1
- http://www.ubuntu.com/usn/USN-2049-1
- http://www.ubuntu.com/usn/USN-2050-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1007872
- https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6aeExploitPatch
FAQ
What is CVE-2013-4350?
CVE-2013-4350 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allo...
How severe is CVE-2013-4350?
CVE-2013-4350 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4350?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.