Lucene search

K
akamaiblogAkamaiAKAMAIBLOG:5E43C86ED76BCE1E1BE3664DD7BC1BA2
HistoryAug 06, 2018 - 4:15 p.m.

Linux Kernel TCP Vulnerability

2018-08-0616:15:53
Akamai
feedproxy.google.com
205

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.895 High

EPSS

Percentile

98.5%

On the week of July 15th researcher Juha-Matti Tilli disclosed a vulnerability he discovered in the Linux kernel to the kernel maintainers, the National Cyber Security Center - Finland (NCSC-FI), CERT Coordination Center (CERT/CC), and Akamai. The vulnerability, CVE-2018-5390, is a resource exhaustion attack triggered by a specially crafted stream of TCP segments which creates expensive processing within the Linux kernel.

In preparation for the public disclosure of the vulnerability, Akamai prepared and began deploying patches for its network. Simultaneously, Akamai has been working with external parties to ensure that the solution works, verifying that the fix was sufficient to protect its network and customers. Akamai continues to work closely with the vulnerability coordinators at NCSC-FI and CERT/CC to aid the vulnerability disclosure, testing and notification processes.

This issue impacts nearly all current Linux systems, while versions of the Linux kernel release 4.9 or later being the most susceptible. Release version 4.8 and older, while still impacted, require more malicious traffic to exhibit the same level of resource exhaustion.

Impact on our Network

All organizations that use recent versions of the Linux kernel are exposed to this issue prior to patching, including Akamai. Shortly after notification of the vulnerability we began the process of patching our systems, starting with the most critical of our services and continuing on to the rest of our network. At this point, all critical services are patched and we are working to complete the patching on the few remaining systems that could be impacted.

How to protect yourself

We recommend updating your operating system as soon as patches are available. Many Linux distributions have been notified of the vulnerability and expect to be releasing patches today (August 6, 2018) through their normal distribution channels. Keep an eye out for CVE-2018-5390 listed in the release notes of your distribution.

Akamai is grateful to Juha-Matti Tilli for his efforts to work with our security team and other organizations involved to make it possible to quickly respond to this vulnerability.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.895 High

EPSS

Percentile

98.5%