Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5391

Опубликовано: 06 сент. 2018
Источник: debian
EPSS Низкий

Описание

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.17.15-1package

Примечания

  • Mitigation: Change the default values of net.ipv4.ipfrag_high_thresh and

  • net.ipv4.ipfrag_low_thresh back to 256kB and 192 kB (respectively) or

  • below.

EPSS

Процентиль: 82%
0.01712
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVSS3: 7.5
redhat
почти 7 лет назад

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

CVSS3: 7.5
nvd
почти 7 лет назад

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

suse-cvrf
больше 6 лет назад

Security update for the Linux Kernel (Live Patch 2 for SLE 15)

suse-cvrf
больше 6 лет назад

Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)

EPSS

Процентиль: 82%
0.01712
Низкий