Vulnerability Name:

CVE-2006-4535 (CCN-29011)

Assigned:2006-08-28
Published:2006-08-28
Updated:2017-10-11
Summary:The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745.
Note: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.
CVSS v3 Severity:6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
3.5 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-399
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2006-4535

Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: CCN
Type: RHSA-2006-0689
kernel security update

Source: CCN
Type: SA21945
Linux Kernel SCTP Denial of Service Vulnerability

Source: SECUNIA
Type: Vendor Advisory
21945

Source: SECUNIA
Type: Vendor Advisory
21967

Source: SECUNIA
Type: Vendor Advisory
22082

Source: SECUNIA
Type: Vendor Advisory
22093

Source: SECUNIA
Type: Vendor Advisory
22292

Source: SECUNIA
Type: UNKNOWN
22382

Source: CCN
Type: SA22945
Avaya Products Linux Kernel Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
22945

Source: CCN
Type: SECTRACK ID: 1016992
Linux Kernel SCTP Socket SO_LINGER Option Lets Local Users Deny Service

Source: SECTRACK
Type: UNKNOWN
1016992

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm

Source: CCN
Type: ASA-2006-249
kernel security update (RHSA-2006-0689)

Source: DEBIAN
Type: UNKNOWN
DSA-1183

Source: DEBIAN
Type: UNKNOWN
DSA-1184

Source: DEBIAN
Type: DSA-1183
kernel-source-2.4.27 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1184
kernel-source-2.6.8 -- several vulnerabilities

Source: MISC
Type: UNKNOWN
http://www.mail-archive.com/kernel-svn-changes@lists.alioth.debian.org/msg02314.html

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:182

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:025

Source: REDHAT
Type: UNKNOWN
RHSA-2006:0689

Source: BID
Type: UNKNOWN
20087

Source: CCN
Type: BID-20087
Linux Kernel SCTP SO_LINGER Local Denial of Service Vulnerability

Source: CCN
Type: USN-347-1
Linux kernel vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-347-1

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204460

Source: XF
Type: UNKNOWN
kernel-sctp-dos(29011)

Source: XF
Type: UNKNOWN
kernel-sctp-dos(29011)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10530

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10530
    V
    The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.
    2013-04-29
    oval:org.debian:def:1184
    V
    several vulnerabilities
    2013-01-21
    oval:com.redhat.rhsa:def:20060689
    P
    RHSA-2006:0689: kernel security update (Important)
    2006-10-05
    oval:org.debian:def:1183
    V
    several vulnerabilities
    2006-09-25
    BACK
    linux linux kernel 2.6.17.10
    linux linux kernel 2.6.17.11
    linux linux kernel 2.6.18 rc5
    linux linux kernel 2.6.18 rc5
    linux linux kernel 2.6.17.11
    linux linux kernel 2.6.17.10
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake multi network firewall 2.0
    mandrakesoft mandrake linux 2006
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0