Linux Kernel TCP implementation vulnerable to Denial of Service [CVE-2018-5390]

Posted by & filed under Ειδοποιήσεις.

The Linux kernel, versions 4.9+, is vulnerable to denial of service conditions with low rates of specially modified packets.

Description

CWE-400: Uncontrolled Resource Consumption (‘Resource Exhaustion’)

CVE IDs: CVE-2018-5390
Date Public: 23 Jul 2018
Date First Published: 06 Aug 2018
Date Last Updated: 06 Aug 2018

Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. An attacker can induce a denial of service condition by sending specially modified packets within ongoing TCP sessions. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port. Thus, the attacks cannot be performed using spoofed IP addresses.

Impact

A remote attacker may be able to trigger a denial-of-service condition against a system with an available open port.

Solution

Apply a patch: Patches for the Linux kernel are available to address the vulnerability.

CVSS Metrics

Group: Base Score: 7.1 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Group: Temporal Score: 6.4 Vector: E:POC/RL:ND/RC:C
Group: Environmental Score: 6.4 Vector: CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
https://www.spinics.net/lists/netdev/msg514742.html

 

The information contained in this website is for general information purposes only. The information is gathered from KB CERT while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.
Through this website, you are able to link to other websites which are not under the control of CSIRT-CY. We have no control over the nature, content and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.
Every effort is made to keep the website up and running smoothly. However, CSIRT-CY takes no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.