Описание
Windows Denial of Service Vulnerability
Microsoft is aware of a denial of service vulnerability (named "FragmentSmack" CVE-2018-5391) affecting Windows systems. An attacker could send many 8-byte sized IP fragments with random starting offsets, but withhold the last fragment and exploit the worst-case complexity of linked lists in reassembling IP fragments. A system under attack would become unresponsive with 100% CPU utilization but would recover as soon as the attack terminated.
Recommended actions
To protect your system from this vulnerability, Microsoft recommends that you take the following actions:
- Register for security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
- Test and apply security updates. See the Affected Products table to download and install the updates.
- If you cannot apply the security updates immediately, you can apply the workaround described in FAQ #1.
FAQ
1. What workaround(s) exist for this vulnerability?
The following commands disable packet reassembly. Any out-of-order packets are dropped. There is a potential for packet loss when discarding out-of-order packets. Valid scenarios should not exceed more than 50 out-of-order fragments.
We recommend testing prior to updating production systems.
Further netsh guidance can be found at netsh.
2. Is Azure affected?
Azure fabric layer protections mitigate this vulnerability. This is blocked before traffic reaches Azure VMs.
3. What can I do at the perimeter to block this attack?
Review the perimeter device guidance and modify reassembly packet limits similar to the commands listed in FAQ #1.
Обходное решение
Refer to FAQ #1 for the Workaround for this vulnerability.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for Itanium-Based Systems Service Pack 2 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows 7 for 32-bit Systems Service Pack 1 | ||
Windows 7 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS