Unknown
SACK can cause extensive memory use via fragmented resend queue
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
SACK can cause extensive memory use via fragmented resend queue
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- canonical,
- f5,
- ivanti,
- linux,
- pulsesecure,
- redhat
Products
- big-ip access policy manager,
- big-ip access policy manager 15.0.0,
- big-ip advanced firewall manager,
- big-ip advanced firewall manager 15.0.0,
- big-ip analytics,
- big-ip analytics 15.0.0,
- big-ip application acceleration manager,
- big-ip application acceleration manager 15.0.0,
- big-ip application security manager,
- big-ip application security manager 15.0.0,
- big-ip domain name system,
- big-ip domain name system 15.0.0,
- big-ip edge gateway,
- big-ip edge gateway 15.0.0,
- big-ip fraud protection service,
- big-ip fraud protection service 15.0.0,
- big-ip global traffic manager,
- big-ip global traffic manager 15.0.0,
- big-ip link controller,
- big-ip link controller 15.0.0,
- big-ip local traffic manager,
- big-ip local traffic manager 15.0.0,
- big-ip policy enforcement manager,
- big-ip policy enforcement manager 15.0.0,
- big-ip webaccelerator,
- big-ip webaccelerator 15.0.0,
- connect secure -,
- enterprise linux 5.0,
- enterprise linux 6.0,
- enterprise linux 7.0,
- enterprise linux 8.0,
- enterprise linux atomic host -,
- enterprise linux aus 6.5,
- enterprise linux aus 6.6,
- enterprise linux eus 7.4,
- enterprise linux eus 7.5,
- enterprise mrg 2.0,
- linux kernel,
- pulse policy secure -,
- pulse secure virtual application delivery controller -,
- traffix signaling delivery controller,
- ubuntu linux 12.04,
- ubuntu linux 14.04,
- ubuntu linux 16.04,
- ubuntu linux 18.04,
- ubuntu linux 18.10,
- ubuntu linux 19.04
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: