Lucene search

K
f5F5F5:K46514822
HistoryAug 26, 2016 - 12:00 a.m.

K46514822 : Linux TCP stack vulnerability CVE-2016-5696

2016-08-2600:00:00
my.f5.com
28

5.5 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

75.1%

Security Advisory Description

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (CVE-2016-5696)
Impact
Attackers may be able to hijack network sessions by determining the shared counter that could be used to determine sequence numbers for TCP stream injection. Connections to or from the BIG-IP system by administrative applications such as BIG-IP health monitors, SNMP, Simple Mail Transfer Protocol (SMTP), secure shell (SSH), network time protocol (NTP), etc., are processed by the Linux operating system, and may be exploited by this vulnerability. For more information, refer to K13284: Overview of management interface routing (11.x - 12.x).