HIGH · 7.5

CVE-2014-3687

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplica...

Vulnerability Description

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
LinuxLinux Kernel>= 2.6.27, < 3.2.64
RedhatEnterprise Mrg2.0
CanonicalUbuntu Linux12.04
DebianDebian Linux7.0
NovellSuse Linux Enterprise Desktop12.0
NovellSuse Linux Enterprise Server12.0
OpensuseEvergreen11.4
SuseLinux Enterprise Real Time Extension11
SuseLinux Enterprise Software Development Kit12
SuseLinux Enterprise Workstation Extension12
SuseSuse Linux Enterprise Server11
OracleLinux5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3687?

CVE-2014-3687 is a vulnerability with a CVSS score of 7.5 (HIGH). The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplica...

How severe is CVE-2014-3687?

CVE-2014-3687 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3687?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Mrg, Canonical Ubuntu Linux, Debian Debian Linux, Novell Suse Linux Enterprise Desktop.