Lucene search

K
attackerkbAttackerKBAKB:B358B251-7E9D-453E-8802-E59A3DE72FAA
HistoryFeb 13, 2020 - 12:00 a.m.

TCP SACK PANIC

2020-02-1300:00:00
attackerkb.com
33

EPSS

0.974

Percentile

99.9%

A Linux kernel vulnerability in TCP networking could allow DoS

> CVE-2019-11477 is considered an Important severity, whereas CVE-2019-11478 and CVE-2019-11479 are considered a Moderate severity. The first two are related to the Selective Acknowledgement (SACK) packets combined with Maximum Segment Size (MSS), the third solely with the Maximum Segment Size (MSS).

Vulnerable code exists in <https://github.com/torvalds/linux/blob/master/include/linux/skbuff.h&gt;

This might stick around in various embedded hardware, which could be more disasterous if DoS’ed, but it’s too early to tell.

Recent assessments:

J3rryBl4nks at March 10, 2020 3:02pm UTC reported:

Because this is a kernel panic, it is only useful if your goal is to take the host offline. Because DOS attacks are less useful overall to an attacker than RCE, LFI, or anything useful really, these vulnerabilities are not useful to have in your toolkit.

asoto-r7 at June 17, 2019 9:06pm UTC reported:

Because this is a kernel panic, it is only useful if your goal is to take the host offline. Because DOS attacks are less useful overall to an attacker than RCE, LFI, or anything useful really, these vulnerabilities are not useful to have in your toolkit.

Assessed Attacker Value: 1
Assessed Attacker Value: 1Assessed Attacker Value: 3