Security Market Segment LS
Tuesday, 18 June 2019 08:00

Linux devices vulnerable to ping of death attack

Linux devices vulnerable to ping of death attack Pixabay

A researcher at Netflix Security has warned of a number of TCP flaws in the Linux and FreeBSD kernels, one of which can be used to send a so-called ping of death to an Internet-facing Linux server and bring about a denial of service.

This flaw affects all Linux kernels above and including the 2.6.29 release, according to the advisory which was issued on Monday.

A modified Linux kernel is present in all Android devices, so this bug could be a source of annoyance if some script kiddie decides to exploit it.

The three bugs have been given their own CVE numbers: CVE-2019-11477 has been graded as important while CVE-2019-11478 and CVE-2019-11479 have been described as moderate.

The first two bugs are related to selective acknowledgement packets and maximum segment size, while the third is related only to the latter. The second bug has two effects, one of which affects kernels after 4.15 while the other affects all kernel versions.

TCP selective acknowledgement aka TCP SACK allows a device receiving data to tell the sender which segments have been accepted, ensuring that segments which have not reached will be sent again. If TCP SACK is disabled, the number of packets that have to be resent is increased greatly.

The maximum segment size defines how much data is in a reconstructed TCP segment and its value is set in the TCP header.

A Red Hat advisory said: "As packets might become fragmented when transmitting across different routes, a host must specify the MSS as equal to the largest IP datagram payload size that a host can handle.

"Very large MSS sizes might mean that a stream of packets ends up fragmented on their way to the destination, whereas smaller packets can ensure less fragmentation but end up with unused overhead."

Netflix's Jonathan Looney said in an advisory that the first bug could be exploited by someone sending a series of SACKs packets to trigger an integer overflow, resulting in kernel panic.

In the case of the second bug, a crafted sequence of SACKs can fragment the TCP retransmission queue and slow down a connection so that it takes up all system resources. In the case of kernels before 4.15, the queue can be slowed down even further.

The third Linux bug affects all kernel versions and allows an attacker to force the break-up of responses to TCP requests into bits that each contain only eight bytes of data, resulting in a big rise in the amount of bandwidth needed to deliver the entire load of data.

There is one bright side to this bug in that the attacker needs to keep working to prolong the pain felt at the other end.

Finally, Looney outlined a bug in the FreeBSD kernel that allows an attacker to slow down SACKs packets and fragment the RACK send map. The queue could then be further slowed down for any further SACKs packets received for that same TCP connection.

Looney offered links to patches and also said a workaround for the two SACKs bugs in Linux was to disable such processing by setting the value of /proc/sys/net/ipv4/tcp_sack to zero.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



iTWire can help you promote your company, services, and products.


Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments