Vulnerability Description
The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP packet, as demonstrated by use of the Token Bucket Filter (TBF) queueing discipline.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.9.8, <= 3.10.23 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2013/11/13/9Mailing ListPatch
- http://www.ubuntu.com/usn/USN-2113-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2117-1Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1030015Issue Tracking
- https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288ExploitPatch
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2013/11/13/9Mailing ListPatch
- http://www.ubuntu.com/usn/USN-2113-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2117-1Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1030015Issue Tracking
- https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288ExploitPatch
FAQ
What is CVE-2013-4563?
CVE-2013-4563 is a vulnerability with a CVSS score of 7.1 (HIGH). The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before i...
How severe is CVE-2013-4563?
CVE-2013-4563 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4563?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux.