Lucene search

K
cve[email protected]CVE-2006-1858
HistoryMay 22, 2006 - 4:06 p.m.

CVE-2006-1858

2006-05-2216:06:00
CWE-20
web.nvd.nist.gov
34
cve-2006-1858
linux kernel
sctp
denial of service
crash
arbitrary code
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.6 High

AI Score

Confidence

High

0.107 Low

EPSS

Percentile

95.1%

SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.

Affected configurations

NVD
Node
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.0test1
OR
linuxlinux_kernelMatch2.6.0test10
OR
linuxlinux_kernelMatch2.6.0test11
OR
linuxlinux_kernelMatch2.6.0test2
OR
linuxlinux_kernelMatch2.6.0test3
OR
linuxlinux_kernelMatch2.6.0test4
OR
linuxlinux_kernelMatch2.6.0test5
OR
linuxlinux_kernelMatch2.6.0test6
OR
linuxlinux_kernelMatch2.6.0test7
OR
linuxlinux_kernelMatch2.6.0test8
OR
linuxlinux_kernelMatch2.6.0test9
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.1rc1
OR
linuxlinux_kernelMatch2.6.1rc2
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.2rc1
OR
linuxlinux_kernelMatch2.6.2rc2
OR
linuxlinux_kernelMatch2.6.2rc3
OR
linuxlinux_kernelMatch2.6.3
OR
linuxlinux_kernelMatch2.6.3rc1
OR
linuxlinux_kernelMatch2.6.3rc2
OR
linuxlinux_kernelMatch2.6.3rc3
OR
linuxlinux_kernelMatch2.6.4
OR
linuxlinux_kernelMatch2.6.4rc1
OR
linuxlinux_kernelMatch2.6.4rc2
OR
linuxlinux_kernelMatch2.6.4rc3
OR
linuxlinux_kernelMatch2.6.5
OR
linuxlinux_kernelMatch2.6.5rc1
OR
linuxlinux_kernelMatch2.6.5rc2
OR
linuxlinux_kernelMatch2.6.5rc3
OR
linuxlinux_kernelMatch2.6.6
OR
linuxlinux_kernelMatch2.6.6rc1
OR
linuxlinux_kernelMatch2.6.6rc2
OR
linuxlinux_kernelMatch2.6.6rc3
OR
linuxlinux_kernelMatch2.6.7
OR
linuxlinux_kernelMatch2.6.7rc1
OR
linuxlinux_kernelMatch2.6.7rc2
OR
linuxlinux_kernelMatch2.6.7rc3
OR
linuxlinux_kernelMatch2.6.8
OR
linuxlinux_kernelMatch2.6.8rc1
OR
linuxlinux_kernelMatch2.6.8rc2
OR
linuxlinux_kernelMatch2.6.8rc3
OR
linuxlinux_kernelMatch2.6.8rc4
OR
linuxlinux_kernelMatch2.6.92.6.20
OR
linuxlinux_kernelMatch2.6.9rc1
OR
linuxlinux_kernelMatch2.6.9rc2
OR
linuxlinux_kernelMatch2.6.9rc3
OR
linuxlinux_kernelMatch2.6.9rc4
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.10rc1
OR
linuxlinux_kernelMatch2.6.10rc2
OR
linuxlinux_kernelMatch2.6.10rc3
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11rc1
OR
linuxlinux_kernelMatch2.6.11rc2
OR
linuxlinux_kernelMatch2.6.11rc3
OR
linuxlinux_kernelMatch2.6.11rc4
OR
linuxlinux_kernelMatch2.6.11rc5
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11.11
OR
linuxlinux_kernelMatch2.6.11.12
OR
linuxlinux_kernelMatch2.6.12rc1
OR
linuxlinux_kernelMatch2.6.12rc2
OR
linuxlinux_kernelMatch2.6.12rc3
OR
linuxlinux_kernelMatch2.6.12rc4
OR
linuxlinux_kernelMatch2.6.12rc5
OR
linuxlinux_kernelMatch2.6.12rc6
OR
linuxlinux_kernelMatch2.6.12.1
OR
linuxlinux_kernelMatch2.6.12.2
OR
linuxlinux_kernelMatch2.6.12.3
OR
linuxlinux_kernelMatch2.6.12.4
OR
linuxlinux_kernelMatch2.6.12.5
OR
linuxlinux_kernelMatch2.6.12.6
OR
linuxlinux_kernelMatch2.6.13
OR
linuxlinux_kernelMatch2.6.13rc1
OR
linuxlinux_kernelMatch2.6.13rc2
OR
linuxlinux_kernelMatch2.6.13rc3
OR
linuxlinux_kernelMatch2.6.13rc4
OR
linuxlinux_kernelMatch2.6.13rc5
OR
linuxlinux_kernelMatch2.6.13rc6
OR
linuxlinux_kernelMatch2.6.13rc7
OR
linuxlinux_kernelMatch2.6.13.1
OR
linuxlinux_kernelMatch2.6.13.2
OR
linuxlinux_kernelMatch2.6.13.3
OR
linuxlinux_kernelMatch2.6.13.4
OR
linuxlinux_kernelMatch2.6.14
OR
linuxlinux_kernelMatch2.6.14rc1
OR
linuxlinux_kernelMatch2.6.14rc2
OR
linuxlinux_kernelMatch2.6.14rc3
OR
linuxlinux_kernelMatch2.6.14rc4
OR
linuxlinux_kernelMatch2.6.14rc5
OR
linuxlinux_kernelMatch2.6.14.1
OR
linuxlinux_kernelMatch2.6.14.2
OR
linuxlinux_kernelMatch2.6.14.3
OR
linuxlinux_kernelMatch2.6.14.4
OR
linuxlinux_kernelMatch2.6.14.5
OR
linuxlinux_kernelMatch2.6.15
OR
linuxlinux_kernelMatch2.6.15rc1
OR
linuxlinux_kernelMatch2.6.15rc3
OR
linuxlinux_kernelMatch2.6.15rc4
OR
linuxlinux_kernelMatch2.6.15rc5
OR
linuxlinux_kernelMatch2.6.15rc6
OR
linuxlinux_kernelMatch2.6.15rc7
OR
linuxlinux_kernelMatch2.6.15.1
OR
linuxlinux_kernelMatch2.6.15.2
OR
linuxlinux_kernelMatch2.6.15.3
OR
linuxlinux_kernelMatch2.6.15.4
OR
linuxlinux_kernelMatch2.6.15.5
OR
linuxlinux_kernelMatch2.6.16rc1
OR
linuxlinux_kernelMatch2.6.16rc2
OR
linuxlinux_kernelMatch2.6.16rc3
OR
linuxlinux_kernelMatch2.6.16rc4
OR
linuxlinux_kernelMatch2.6.16rc5
OR
linuxlinux_kernelMatch2.6.16rc6
OR
linuxlinux_kernelMatch2.6.16.1
OR
linuxlinux_kernelMatch2.6.16.2
OR
linuxlinux_kernelMatch2.6.16.3
OR
linuxlinux_kernelMatch2.6.16.4
OR
linuxlinux_kernelMatch2.6.16.5
OR
linuxlinux_kernelMatch2.6.16.6
OR
linuxlinux_kernelMatch2.6.16.7
OR
linuxlinux_kernelMatch2.6.16.8
OR
linuxlinux_kernelMatch2.6.16.9
OR
linuxlinux_kernelMatch2.6.16.10
OR
linuxlinux_kernelMatch2.6.16.11
OR
linuxlinux_kernelMatch2.6.16.12
OR
linuxlinux_kernelMatch2.6.16.13
OR
linuxlinux_kernelMatch2.6.16.14
OR
linuxlinux_kernelMatch2.6.16.15
OR
linuxlinux_kernelMatch2.6.16.16
OR
linuxlinux_kernelMatch2.6_test9_cvs

References

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.6 High

AI Score

Confidence

High

0.107 Low

EPSS

Percentile

95.1%