Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5696

Опубликовано: 12 июл. 2016
Источник: redhat
CVSS3: 4.8
CVSS2: 5.8

Описание

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.

Отчет

This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4kernelNot affected
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux Extended Update Support 6.2kernelNot affected
Red Hat Enterprise Linux Extended Update Support 6.4kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2016:166423.08.2016
Red Hat Enterprise Linux 6.5 Advanced Update SupportkernelFixedRHSA-2016:181406.09.2016
Red Hat Enterprise Linux 6.6 Extended Update SupportkernelFixedRHSA-2016:193927.09.2016
Red Hat Enterprise Linux 6.7 Extended Update SupportkernelFixedRHSA-2016:181506.09.2016
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2016:163218.08.2016
Red Hat Enterprise Linux 7kernelFixedRHSA-2016:163318.08.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-203
https://bugzilla.redhat.com/show_bug.cgi?id=1354708kernel: challenge ACK counter information disclosure.

4.8 Medium

CVSS3

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 9 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

CVSS3: 4.8
nvd
около 9 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

CVSS3: 4.8
debian
около 9 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly ...

CVSS3: 4.8
github
больше 3 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

oracle-oval
около 9 лет назад

ELSA-2016-3595: Unbreakable Enterprise kernel security update (IMPORTANT)

4.8 Medium

CVSS3

5.8 Medium

CVSS2