Lucene search

K
freebsdFreeBSD3EC8F43B-E8EF-11D9-B875-0001020EED82
HistoryJun 29, 2005 - 12:00 a.m.

kernel -- TCP connection stall denial of service

2005-06-2900:00:00
vuxml.freebsd.org
19

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.931 High

EPSS

Percentile

99.1%

Problem Description
Two problems have been discovered in the FreeBSD TCP stack.
First, when a TCP packets containing a timestamp is
received, inadequate checking of sequence numbers is
performed, allowing an attacker to artificially increase the
internal “recent” timestamp for a connection.
Second, a TCP packet with the SYN flag set is accepted for
established connections, allowing an attacker to overwrite
certain TCP options.
Impact
Using either of the two problems an attacker with knowledge
of the local and remote IP and port numbers associated with
a connection can cause a denial of service situation by
stalling the TCP connection. The stalled TCP connection my
be closed after some time by the other host.
Workaround
In some cases it may be possible to defend against these
attacks by blocking the attack packets using a firewall.
Packets used to effect either of these attacks would have
spoofed source IP addresses.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd= 5.4UNKNOWN
FreeBSDanynoarchfreebsd< 5.4_3UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.931 High

EPSS

Percentile

99.1%