Vulnerability Description
The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 8.3 |
Related Weaknesses (CWE)
References
- http://svnweb.freebsd.org/base?view=revision&revision=254338Patch
- http://www.freebsd.org/security/advisories/FreeBSD-SA-13:10.sctp.ascVendor Advisory
- http://www.securityfocus.com/bid/61939
- http://www.securitytracker.com/id/1028940
- https://bugzilla.mozilla.org/show_bug.cgi?id=905080
- http://svnweb.freebsd.org/base?view=revision&revision=254338Patch
- http://www.freebsd.org/security/advisories/FreeBSD-SA-13:10.sctp.ascVendor Advisory
- http://www.securityfocus.com/bid/61939
- http://www.securitytracker.com/id/1028940
- https://bugzilla.mozilla.org/show_bug.cgi?id=905080
FAQ
What is CVE-2013-5209?
CVE-2013-5209 is a vulnerability with a CVSS score of 7.8 (HIGH). The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data struc...
How severe is CVE-2013-5209?
CVE-2013-5209 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5209?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.