Vulnerability Details : CVE-2015-1421
Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
Vulnerability category: Memory CorruptionDenial of service
Threat overview for CVE-2015-1421
Top countries where our scanners detected CVE-2015-1421
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2015-1421 12,730
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-1421!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-1421
Probability of exploitation activity in the next 30 days: 6.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-1421
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2015-1421
-
http://www.securityfocus.com/bid/72356
Linux Kernel CVE-2015-1421 Local Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2015/01/29/15
oss-security - Re: CVE request -- Linux kernel - net: sctp: slab corruption from use after free on INIT collisionsMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2563-1
USN-2563-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0726.html
RHSA-2015:0726 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2545-1
USN-2545-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1196581
1196581 – (CVE-2015-1421) CVE-2015-1421 kernel: net: slab corruption from use after free on INIT collisionsIssue Tracking;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0782.html
RHSA-2015:0782 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00001.html
[security-announce] SUSE-SU-2015:0832-1: important: Security update forMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1082.html
RHSA-2015:1082 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2542-1
USN-2542-1: Linux kernel (OMAP4) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
[security-announce] SUSE-SU-2015:1478-1: important: Security update forMailing List;Third Party Advisory
-
http://www.debian.org/security/2015/dsa-3170
Debian -- Security Information -- DSA-3170-1 linuxThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2562-1
USN-2562-1: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.8
Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0864.html
RHSA-2015:0864 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=600ddd6825543962fb807884169e57b580dba208
kernel/git/torvalds/linux.git - Linux kernel source treeVendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-0751.html
RHSA-2015:0751 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securitytracker.com/id/1032172
Linux Kernel Use-After-Free in sctp_assoc_update() Lets Remote Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2541-1
USN-2541-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2546-1
USN-2546-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://github.com/torvalds/linux/commit/600ddd6825543962fb807884169e57b580dba208
net: sctp: fix slab corruption from use after free on INIT collisions · torvalds/linux@600ddd6 · GitHubThird Party Advisory
Products affected by CVE-2015-1421
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*