Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-5972
HistoryFeb 14, 2017 - 12:00 a.m.

CVE-2017-5972

2017-02-1400:00:00
ubuntu.com
ubuntu.com
7

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.036 Low

EPSS

Percentile

91.5%

The TCP stack in the Linux kernel 3.x does not properly implement a SYN
cookie protection mechanism for the case of a fast network connection,
which allows remote attackers to cause a denial of service (CPU
consumption) by sending many TCP SYN packets, as demonstrated by an attack
against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties
have been unable to discern any relationship between the GitHub Engineering
finding and the Trigemini.c attack code.

Notes

Author Note
sbeattie probably addressed by Eric Dumazet’s “lockless listener” series (final git commit in series listed in references)

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.036 Low

EPSS

Percentile

91.5%