FreeBSD Security Advisory - FreeBSD-SA-16:01.sctp

Discussion in 'News Aggregator' started by Packet Storm, 15 Jan 2016.

  1. Packet Storm

    Packet Storm Guest

    FreeBSD Security Advisory - A lack of proper input checks in the ICMPv6 processing in the SCTP stack can lead to either a failed kernel assertion or to a NULL pointer dereference. In either case, a kernel panic will follow. A remote, unauthenticated attacker can reliably trigger a kernel panic in a vulnerable system running IPv6. Any kernel compiled with both IPv6 and SCTP support is vulnerable. There is no requirement to have an SCTP socket open. IPv4 ICMP processing is not impacted by this vulnerability.

    Continue reading...
     

Share This Page

Loading...