CVE-2014-0101

high F5
CVSS v3 Base Score
7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS Score
3.1%
Exploitation probability in 30 days
Top 13% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Confidentiality
None
Integrity
None
Availability
C
Published: March 11, 2014 (4446 days ago)
Last Modified: May 6, 2026
Vendor: F5
Source: NVD

Description

The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.

CWE

CWE-476

Affected Products

linux linux kernelredhat enterprise linux desktopredhat enterprise linux eusredhat enterprise linux serverredhat enterprise linux server ausredhat enterprise linux server tusredhat enterprise linux workstationcanonical ubuntu linuxf5 big-ip access policy managerf5 big-ip advanced firewall manager

References