7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.036 Low
EPSS
Percentile
91.5%
The TCP stack in the Linux kernel 3.x does not properly implement a SYN
cookie protection mechanism for the case of a fast network connection,
which allows remote attackers to cause a denial of service (CPU
consumption) by sending many TCP SYN packets, as demonstrated by an attack
against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties
have been unable to discern any relationship between the GitHub Engineering
finding and the Trigemini.c attack code.
Author | Note |
---|---|
sbeattie | probably addressed by Eric Dumazet’s “lockless listener” series (final git commit in series listed in references) |
cxsecurity.com/issue/WLB-2017020112
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e994b2f0fb9229aeff5eea9541320bd7b2ca8714
githubengineering.com/syn-flood-mitigation-with-synsanity/
launchpad.net/bugs/cve/CVE-2017-5972
nvd.nist.gov/vuln/detail/CVE-2017-5972
security-tracker.debian.org/tracker/CVE-2017-5972
www.cve.org/CVERecord?id=CVE-2017-5972
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.036 Low
EPSS
Percentile
91.5%