Vulnerability Details : CVE-2013-5209
The sctp_send_initiate_ack function in sys/netinet/sctp_output.c in the SCTP implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE does not properly initialize the state-cookie data structure, which allows remote attackers to obtain sensitive information from kernel stack memory by reading packet data in INIT-ACK chunks.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2013-5209
Probability of exploitation activity in the next 30 days: 0.35%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 68 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-5209
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:C/I:N/A:N |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2013-5209
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-5209
-
http://www.securityfocus.com/bid/61939
FreeBSD CVE-2013-5209 Information Disclosure Vulnerability
-
http://www.freebsd.org/security/advisories/FreeBSD-SA-13:10.sctp.asc
Vendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=905080
905080 - Uninitialised value use relating to sctp_send_initiate_ack
-
http://www.securitytracker.com/id/1028940
FreeBSD SCTP Discloses Portions of Kernel Memory Contents to Remote Users - SecurityTracker
-
http://svnweb.freebsd.org/base?view=revision&revision=254338
[base] Revision 254338Patch
Products affected by CVE-2013-5209
- cpe:2.3:o:freebsd:freebsd:8.3:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:prerelease:*:*:*:*:*:*