Linux 2.6 Netfilter TCP Option Matching DoS

medium Nessus Plugin ID 12296

Synopsis

The remote host is prone to a denial of service attack.

Description

It was possible to crash the remote host by sending a specially malformed TCP/IP packet with invalid TCP options. Only version 2.6 of the Linux kernel is known to be affected by this problem. An attacker may use this flaw to disable this host remotely.

Solution

Upgrade to Linux 2.6.8 or later.

See Also

https://www.securityfocus.com/archive/1/367615/30/0/threaded

http://www.nessus.org/u?9ba1bace

Plugin Details

Severity: Medium

ID: 12296

File Name: linux26_tcpopt_dos.nasl

Version: 1.22

Type: remote

Published: 7/1/2004

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:linux:kernel

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/30/2004

Reference Information

CVE: CVE-2004-0626

BID: 10634