Overview
Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels.
Description
CVE-2019-11477: SACK Panic (Linux >= 2.6.29). A sequence of specifically crafted selective acknowledgements (SACK) may trigger an integer overflow, leading to a denial of service or possible kernel failure (panic). CVE-2019-11478: SACK Slowness (Linux < 4.15) or Excess Resource Usage (all Linux versions). A sequence of specifically crafted selective acknowledgements (SACK) may cause a fragmented TCP queue, with a potential result in slowness or denial of service. |
Impact
A remote attacker could cause a kernel crash (CVE-2019-11477) or excessive resource consumption leading to a delay or denial of service. |
Solution
Apply Patches |
Several vendors have issued workarounds. See the vendor list below for details from specific vendors. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5.3 | AV:N/AC:L/Au:--/C:C/I:C/A:C |
Temporal | 5 | E:ND/RL:W/RC:C |
Environmental | 5.0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
- https://access.redhat.com/security/vulnerabilities/tcpsack
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5599
Acknowledgements
Jonathan Looney (Netflix Information Security)
This document was written by Laurie Tyzenhaus.
Other Information
CVE IDs: | CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-5599 |
Date Public: | 2019-06-17 |
Date First Published: | 2019-06-20 |
Date Last Updated: | 2019-07-08 14:21 UTC |
Document Revision: | 18 |