Vulnerability Details : CVE-2015-5283
Potential exploit
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2015-5283
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5283
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5283
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | AV:L/AC:M/Au:N/C:N/I:N/A:C |
3.4
|
6.9
|
NIST |
CWE ids for CVE-2015-5283
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5283
-
http://www.securitytracker.com/id/1033808
Linux Kernel SCTP Initialization Race Condition Lets Local Users Cause Denial of Service Conditions on the Target System - SecurityTracker
-
http://www.ubuntu.com/usn/USN-2829-1
USN-2829-1: Linux kernel vulnerabilities | Ubuntu security notices
-
https://bugzilla.redhat.com/show_bug.cgi?id=1257528
1257528 – (CVE-2015-5283) CVE-2015-5283 kernel: Creating multiple sockets when SCTP module isn't loaded leads to kernel panic
-
http://patchwork.ozlabs.org/patch/515996/
[net] sctp: fix race on protocol/netns initialization - PatchworkExploit
-
http://www.ubuntu.com/usn/USN-2826-1
USN-2826-1: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security notices
-
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
[security-announce] SUSE-SU-2015:2194-1: important: Security update for
-
http://www.securityfocus.com/bid/77058
Linux Kernel SCTP Implementation CVE-2015-5283 Local Denial of Service Vulnerability
-
http://www.ubuntu.com/usn/USN-2829-2
USN-2829-2: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu security notices
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
Oracle Linux Bulletin - October 2015
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
kernel/git/torvalds/linux.git - Linux kernel source treeExploit
-
https://security-tracker.debian.org/tracker/CVE-2015-5283
CVE-2015-5283
-
https://github.com/torvalds/linux/commit/8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
sctp: fix race on protocol/netns initialization · torvalds/linux@8e2d61e · GitHubExploit
-
http://www.ubuntu.com/usn/USN-2823-1
USN-2823-1: Linux kernel vulnerabilities | Ubuntu security notices
-
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.3
-
http://www.debian.org/security/2015/dsa-3372
Debian -- Security Information -- DSA-3372-1 linux
-
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
[security-announce] SUSE-SU-2015:1727-1: important: Security update for
Jump to