CVE-2011-1770

Published: 24 June 2011

Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.

From the Ubuntu security team

Dan Rosenberg discovered that the DCCP stack did not correctly handle certain packet structures. A remote attacker could exploit this to crash the system, leading to a denial of service.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39)
Patches:
Introduced by e77b8363b2ea7c0d89919547c1a8b0562f298b57
Fixed by a294865978b701e4d0d90135672749531b9a900d
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.39)