Unrated severityNVD Advisory· Published Aug 1, 2014· Updated May 6, 2026
CVE-2014-5077
CVE-2014-5077
Description
The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
Affected products
11cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aanvdPatchThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1083.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1668.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1763.htmlnvdThird Party Advisory
- secunia.com/advisories/59777nvdThird Party Advisory
- secunia.com/advisories/60430nvdThird Party Advisory
- secunia.com/advisories/60545nvdThird Party Advisory
- secunia.com/advisories/60564nvdThird Party Advisory
- secunia.com/advisories/60744nvdThird Party Advisory
- secunia.com/advisories/62563nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2014/07/26/1nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/68881nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030681nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2334-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2335-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2358-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2359-1nvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/95134nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.