Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-2523 | First vendor Publication | 2014-03-24 |
Vendor | Cve | Last vendor Modification | 2023-11-07 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2523 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:24383 | |||
Oval ID: | oval:org.mitre.oval:def:24383 | ||
Title: | USN-2174-1 -- linux-ec2 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2174-1 CVE-2014-0101 CVE-2014-2523 | Version: | 5 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24412 | |||
Oval ID: | oval:org.mitre.oval:def:24412 | ||
Title: | DSA-2906-1 linux-2.6 - several | ||
Description: | Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2906-1 CVE-2013-0343 CVE-2013-2147 CVE-2013-2889 CVE-2013-2893 CVE-2013-2929 CVE-2013-4162 CVE-2013-4299 CVE-2013-4345 CVE-2013-4512 CVE-2013-4587 CVE-2013-6367 CVE-2013-6380 CVE-2013-6381 CVE-2013-6382 CVE-2013-6383 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7339 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2039 CVE-2014-2523 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | linux-2.6 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24573 | |||
Oval ID: | oval:org.mitre.oval:def:24573 | ||
Title: | ELSA-2014:0475: kernel security and bug fix update (Important) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol (DCCP) packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-2523, Important) * A flaw was found in the way the Linux kernel's Adaptec RAID controller (aacraid) checked permissions of compat IOCTLs. A local attacker could use this flaw to bypass intended security restrictions. (CVE-2013-6383, Moderate) * A flaw was found in the way the handle_rx() function handled large network packets when mergeable buffers were disabled. A privileged guest user could use this flaw to crash the host or corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0077, Moderate) The CVE-2014-0077 issue was discovered by Michael S. Tsirkin of Red Hat. This update also fixes several bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014:0475-00 CVE-2013-6383 CVE-2014-0077 CVE-2014-2523 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24577 | |||
Oval ID: | oval:org.mitre.oval:def:24577 | ||
Title: | RHSA-2014:0475: kernel security and bug fix update (Important) | ||
Description: | The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol (DCCP) packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. (CVE-2014-2523, Important) * A flaw was found in the way the Linux kernel's Adaptec RAID controller (aacraid) checked permissions of compat IOCTLs. A local attacker could use this flaw to bypass intended security restrictions. (CVE-2013-6383, Moderate) * A flaw was found in the way the handle_rx() function handled large network packets when mergeable buffers were disabled. A privileged guest user could use this flaw to crash the host or corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2014-0077, Moderate) The CVE-2014-0077 issue was discovered by Michael S. Tsirkin of Red Hat. This update also fixes several bugs. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. All kernel users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0475-00 CESA-2014:0475 CVE-2013-6383 CVE-2014-0077 CVE-2014-2523 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26607 | |||
Oval ID: | oval:org.mitre.oval:def:26607 | ||
Title: | DEPRECATED: ELSA-2014-0475 -- kernel security and bug fix update (important) | ||
Description: | A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol (DCCP) packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-0475 CVE-2014-0077 CVE-2013-6383 CVE-2014-2523 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26883 | |||
Oval ID: | oval:org.mitre.oval:def:26883 | ||
Title: | ELSA-2014-3014 -- unbreakable enterprise kernel security update (important) | ||
Description: | kernel-uek [3.8.13-26.2.2.el6uek] - netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages (Daniel Borkmann) [Orabug: 18421673] {CVE-2014-2523} - cifs: ensure that uncached writes handle unmapped areas correctly (Jeff Layton) [Orabug: 18461067] {CVE-2014-0069} {CVE-2014-0069} - net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable (Daniel Borkmann) [Orabug: 18461065] {CVE-2014-0101} - vhost-net: insufficient handling of error conditions in get_rx_bufs() (Guangyu Sun) [Orabug: 18461050] {CVE-2014-0055} | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-3014 CVE-2014-0055 CVE-2014-0069 CVE-2014-0101 CVE-2014-2523 | Version: | 5 |
Platform(s): | Oracle Linux 6 | Product(s): | dtrace-modules kernel-uek kernel-uek-debug kernel-uek-debug-devel kernel-uek-devel kernel-uek-doc kernel-uek-firmware kernel-uek-headers |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0634.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-0629.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0593.nasl - Type : ACT_GATHER_INFO |
2014-11-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0520.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-328.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0439.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140709.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-376.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-375.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-124.nasl - Type : ACT_GATHER_INFO |
2014-05-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2223-1.nasl - Type : ACT_GATHER_INFO |
2014-05-28 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2228-1.nasl - Type : ACT_GATHER_INFO |
2014-05-28 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2225-1.nasl - Type : ACT_GATHER_INFO |
2014-05-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2224-1.nasl - Type : ACT_GATHER_INFO |
2014-05-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2221-1.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3034.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140507_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0475.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0475.nasl - Type : ACT_GATHER_INFO |
2014-05-09 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0475.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2174-1.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2173-1.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2906.nasl - Type : ACT_GATHER_INFO |
2014-03-28 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3016.nasl - Type : ACT_GATHER_INFO |
2014-03-28 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4360.nasl - Type : ACT_GATHER_INFO |
2014-03-28 | Name : The remote Fedora host is missing a security update. File : fedora_2014-4317.nasl - Type : ACT_GATHER_INFO |
2014-03-27 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3014.nasl - Type : ACT_GATHER_INFO |
2014-03-27 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3015.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-03-12 12:24:39 |
|
2024-02-02 01:27:06 |
|
2024-02-01 12:08:01 |
|
2023-12-29 01:23:40 |
|
2023-11-22 01:23:31 |
|
2023-11-07 21:45:37 |
|
2023-09-05 12:25:40 |
|
2023-09-05 01:07:55 |
|
2023-09-02 12:25:39 |
|
2023-09-02 01:08:01 |
|
2023-08-12 12:27:56 |
|
2023-08-12 01:07:32 |
|
2023-08-11 12:23:48 |
|
2023-08-11 01:07:43 |
|
2023-08-06 12:23:07 |
|
2023-08-06 01:07:30 |
|
2023-08-04 12:23:10 |
|
2023-08-04 01:07:34 |
|
2023-07-14 12:23:08 |
|
2023-07-14 01:07:33 |
|
2023-03-29 01:25:01 |
|
2023-03-28 12:07:54 |
|
2023-01-19 21:27:55 |
|
2022-10-11 12:20:54 |
|
2022-10-11 01:07:42 |
|
2022-09-09 01:18:21 |
|
2022-03-11 01:17:13 |
|
2021-05-25 12:13:57 |
|
2021-05-04 12:32:03 |
|
2021-04-22 01:39:10 |
|
2020-09-02 17:22:57 |
|
2020-08-11 12:10:46 |
|
2020-08-08 01:10:45 |
|
2020-08-07 12:10:54 |
|
2020-08-07 01:11:24 |
|
2020-08-01 12:10:45 |
|
2020-07-30 01:11:18 |
|
2020-05-23 01:51:43 |
|
2020-05-23 00:40:35 |
|
2019-01-25 12:06:12 |
|
2018-11-17 12:04:44 |
|
2018-10-30 12:06:48 |
|
2018-08-09 12:02:48 |
|
2018-04-25 12:05:37 |
|
2017-12-16 09:21:41 |
|
2017-08-29 09:24:29 |
|
2017-04-04 13:20:39 |
|
2016-08-12 12:01:24 |
|
2016-06-30 21:37:49 |
|
2016-06-28 22:41:30 |
|
2016-04-27 00:35:48 |
|
2014-11-08 13:31:43 |
|
2014-10-12 13:27:15 |
|
2014-07-23 13:25:03 |
|
2014-07-18 13:24:29 |
|
2014-06-14 13:37:21 |
|
2014-05-29 13:23:34 |
|
2014-05-28 13:23:32 |
|
2014-05-21 13:23:32 |
|
2014-05-10 13:25:54 |
|
2014-04-28 13:21:55 |
|
2014-04-01 14:41:34 |
|
2014-03-29 13:23:50 |
|
2014-03-28 13:22:11 |
|
2014-03-25 21:22:00 |
|
2014-03-24 21:24:40 |
|