Overview
Part of the Transmission Control Protocol (TCP) specification (RFC 1122) allows a receiver to advertise a zero byte window, instructing the sender to maintain the connection but not send additional TCP payload data. The sender should then probe the receiver to check if the receiver is ready to accept data. Narrow interpretation of this part of the specification can create a denial-of-service vulnerability. By advertising a zero receive window and acknowledging probes, a malicious receiver can cause a sender to consume resources (TCP state, buffers, and application memory), preventing the targeted service or system from handling legitimate connections.
Description
TCP implementations from multiple vendors are vulnerable to malicious or misbehaving connections that indefinitely advertize a zero receive window. RFC 1122 section 4.2.2.17 states that "A TCP MAY keep its offered receive window closed indefinitely. As long as the receiving TCP continues to send acknowledgments in response to the probe segments, the sending TCP MUST allow the connection to stay open." The TCP connection is open however no data is being transmitted. This "stalled" state is generally referred to as the TCP persist condition. The intent of RFC 1122 section 4.2.2.17 is that TCP must not terminate connections in the persist condition under normal operating conditions. It is possible to interpret the language narrowly to mean that TCP must not terminate connections in the persist condition under any circumstances, and this interpretation is likely to cause denial-of-services vulnerabilities. An attacker can asymmetrically consume server resources by making TCP connections, optionally requesting data, then setting the receive window to zero and repeatedly acknowledging window probes from the server. |
Impact
A remote, unauthenticated attacker can cause a denial of service. The attacker may be able to cause the operating system or network application to be unresponsive for the duration of the attack. |
Solution
Modifications can be made to TCP implementations, interfaces, operating systems, and network applications, however any changes should consider the balance between improved resiliency and decreased interoperability. The IETF TCPM is considering the problem and any potential changes to TCP or guidance to implementors. As of the publication of this vulnerability note, the IETF has not yet decided whether additional clarifications of the TCP specifications are necessary. Some vendors have implemented changes to improve resiliency against zero window and other TCP state attacks. Consider the analysis and advice provided in the CPNI assessment. |
|
Vendor Information
Generally, any system or product that implements or uses TCP could be affected by this vulnerability, depending on how the product handles resource exhaustion and TCP connections in persist. By design, TCP does not inherently defend against denial-of-service attacks based on resource exhaustion. Decisions about how to detect and respond to such attacks are the responsibility of individual systems or products. |
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- http://tools.ietf.org/html/rfc1122#page-92
- http://tools.ietf.org/html/draft-ananth-tcpm-persist-01
- http://tools.ietf.org/html/draft-mahesh-persist-timeout-02
- http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
- https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
- http://shlang.com/netkill/
- http://www.netasq.com/en/threats/sockstress.php
- http://www.phrack.org/issues.html?issue=66&id=9#article
- http://isc.sans.org/diary.html?storyid=5104
- http://www.t2.fi/2008/08/27/jack-c-louis-and-robert-e-lee-to-talk-about-new-dos-attack-vectors/
- http://www.darkreading.com/blog.asp?blog_sectionid=403&doc_id=164939&WT.svl=tease2_2
- http://www.ietf.org/mail-archive/web/tcpm/current/msg04040.html
- http://www.ietf.org/mail-archive/web/tcpm/current/msg03826.html
- http://www.ietf.org/mail-archive/web/tcpm/current/msg03503.html
- http://www.ietf.org/mail-archive/web/tcpm/current/msg02870.html
- http://www.ietf.org/mail-archive/web/tcpm/current/msg02557.html
- http://www.ietf.org/mail-archive/web/tcpm/current/msg02189.html
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git;a=blob;f=net/ipv4/tcp_timer.c;h=b144a26359bcf34a4b0606e171f97dc709afdfbb;hb=120f68c426e746771e8c09736c0f753822ff3f52#l233
- http://sla.ckers.org/forum/read.php?14,27324
- http://www.checkpoint.com/defense/advisories/public/announcement/090809-tcpip-dos-sockstress.html
- http://www.securityfocus.com/archive/1/archive/1/506331/100/0/
Acknowledgements
Thanks to Mahesh Jethanandani and CERT-FI for their efforts researching and coordinating vendor responses to this vulnerability. Thanks also to Barry Greene, Lars Eggert, Wesley Eddy, and David Borman for their review and comments.
This document was written by David Warren and Art Manion.
Other Information
CVE IDs: | CVE-2009-1926, CVE-2008-4609 |
Severity Metric: | 15.59 |
Date Public: | 2006-07-20 |
Date First Published: | 2009-11-23 |
Date Last Updated: | 2013-02-13 19:33 UTC |
Document Revision: | 123 |