Security Market Segment LS
Tuesday, 18 June 2019 08:00

Linux devices vulnerable to ping of death attack

By
Linux devices vulnerable to ping of death attack Pixabay

A researcher at Netflix Security has warned of a number of TCP flaws in the Linux and FreeBSD kernels, one of which can be used to send a so-called ping of death to an Internet-facing Linux server and bring about a denial of service.

This flaw affects all Linux kernels above and including the 2.6.29 release, according to the advisory which was issued on Monday.

A modified Linux kernel is present in all Android devices, so this bug could be a source of annoyance if some script kiddie decides to exploit it.

The three bugs have been given their own CVE numbers: CVE-2019-11477 has been graded as important while CVE-2019-11478 and CVE-2019-11479 have been described as moderate.

The first two bugs are related to selective acknowledgement packets and maximum segment size, while the third is related only to the latter. The second bug has two effects, one of which affects kernels after 4.15 while the other affects all kernel versions.

TCP selective acknowledgement aka TCP SACK allows a device receiving data to tell the sender which segments have been accepted, ensuring that segments which have not reached will be sent again. If TCP SACK is disabled, the number of packets that have to be resent is increased greatly.

The maximum segment size defines how much data is in a reconstructed TCP segment and its value is set in the TCP header.

A Red Hat advisory said: "As packets might become fragmented when transmitting across different routes, a host must specify the MSS as equal to the largest IP datagram payload size that a host can handle.

"Very large MSS sizes might mean that a stream of packets ends up fragmented on their way to the destination, whereas smaller packets can ensure less fragmentation but end up with unused overhead."

Netflix's Jonathan Looney said in an advisory that the first bug could be exploited by someone sending a series of SACKs packets to trigger an integer overflow, resulting in kernel panic.

In the case of the second bug, a crafted sequence of SACKs can fragment the TCP retransmission queue and slow down a connection so that it takes up all system resources. In the case of kernels before 4.15, the queue can be slowed down even further.

The third Linux bug affects all kernel versions and allows an attacker to force the break-up of responses to TCP requests into bits that each contain only eight bytes of data, resulting in a big rise in the amount of bandwidth needed to deliver the entire load of data.

There is one bright side to this bug in that the attacker needs to keep working to prolong the pain felt at the other end.

Finally, Looney outlined a bug in the FreeBSD kernel that allows an attacker to slow down SACKs packets and fragment the RACK send map. The queue could then be further slowed down for any further SACKs packets received for that same TCP connection.

Looney offered links to patches and also said a workaround for the two SACKs bugs in Linux was to disable such processing by setting the value of /proc/sys/net/ipv4/tcp_sack to zero.

BUSINESS WORKS BETTER WITH WINDOWS 1O. MAKE THE SHIFT

You cannot afford to miss this Dell Webinar.

With Windows 7 support ending 14th January 2020, its time to start looking at your options.

This can have significant impacts on your organisation but also presents organisations with an opportunity to fundamentally rethink the way users work.

The Details

When: Thursday, September 26, 2019
Presenter: Dell Technologies
Location: Your Computer

Timezones

QLD, VIC, NSW, ACT & TAS: 11:00 am
SA, NT: 10:30 am
WA: 9:00 am NZ: 1:00 pm

Register and find out all the details you need to know below.

REGISTER!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments