CVE Vulnerabilities

CVE-2011-1093

NULL Pointer Dereference

Published: Jul 18, 2011 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.8 HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
7.8 IMPORTANT
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*2.6.38 (excluding)
MRG for RHEL-5RedHatkernel-rt-0:2.6.33.9-rt31.64.el5rt*
Red Hat Enterprise Linux 5RedHatkernel-0:2.6.18-238.12.1.el5*
Red Hat Enterprise Linux 6RedHatkernel-0:2.6.32-71.29.1.el6*
LinuxUbuntuhardy*
LinuxUbuntulucid*
LinuxUbuntumaverick*
LinuxUbuntunatty*
LinuxUbuntuupstream*
Linux-ec2Ubuntulucid*
Linux-ec2Ubuntumaverick*
Linux-ec2Ubuntuupstream*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-lts-backport-maverickUbuntulucid*
Linux-lts-backport-maverickUbuntuupstream*
Linux-lts-backport-nattyUbuntulucid*
Linux-lts-backport-nattyUbuntuupstream*
Linux-lts-backport-oneiricUbuntuupstream*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntumaverick*
Linux-mvl-doveUbuntuupstream*
Linux-ti-omap4Ubuntumaverick*
Linux-ti-omap4Ubuntunatty*
Linux-ti-omap4Ubuntuupstream*

Potential Mitigations

References