The sctp_getsockopt_assoc_stats function in net/sctp/socket.c in the Linux kernel before 3.8.4 does not validate a size value before proceeding to a copy_from_user operation, which allows local users to gain privileges via a crafted application that contains an SCTP_GET_ASSOC_STATS getsockopt system call.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://twitter.com/grsecurity/statuses/309805924749541376 | third party advisory |
http://www.exploit-db.com/exploits/24747 | exploit vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=919315 | issue tracking third party advisory |
http://www.openwall.com/lists/oss-security/2013/03/08/2 | third party advisory mailing list |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=726bc6b092da4c093eb74d13c07184b18c1af0f1 | vendor advisory |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.4 | vendor advisory |
http://grsecurity.net/~spender/sctp.c | third party advisory exploit |
https://github.com/torvalds/linux/commit/726bc6b092da4c093eb74d13c07184b18c1af0f1 | exploit third party advisory patch |