Integer Overflow in SCTP_SOCKOPT_DEBUG_NAME Allows Arbitrary Code Execution
CVE-2004-2013 · HIGH Severity
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
Learn more about our Cis Benchmark Audit For Distribution Independent Linux.