Integer Overflow in SCTP_SOCKOPT_DEBUG_NAME Allows Arbitrary Code Execution

Integer Overflow in SCTP_SOCKOPT_DEBUG_NAME Allows Arbitrary Code Execution

CVE-2004-2013 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.

Learn more about our Cis Benchmark Audit For Distribution Independent Linux.