Linux SCTP再爆远程漏洞


Linux 的 SCTP再爆远程溢出漏洞,请立即更新。现在确认的是此攻击方式对SUSE和Ubuntu的64位相当有效。

* NOTE: you need at least one sctp application bound on the target box

* Supported target:

* Ubuntu 7.04 x86_64 (2.6.20_15-17-generic / 2.6.20_17-server)

* Ubuntu 8.04 x86_64 (2.6.24_16-23 generic/server)

* Ubuntu 8.10 x86_64 (2.6.27_7-10 geenric/server)

* Fedora Core 10 x86_64 (default installed kernel)

* OpenSuse 11.1 x86_64 (default installed kernel)

查看:Linux Kernel 2.6.x SCTP FWD Memory Corruption Remote Exploit

相关内容