CVE-2017-5972
Linux Kernel 3.10.0 (CentOS 7) - Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.
La pila TCP en el kernel de Linux versiones 3.x, no implementa apropiadamente un mecanismo de protección de cookies SYN para el caso de una conexión de red rápida, lo que permite a los atacantes remotos causar una denegación de servicio (consumo de CPU) mediante el envío de muchos paquetes TCP SYN, como es demostrado por un ataque contra el paquete kernel versión 3.10.0 en CentOS Linux versión 7. NOTA: terceros no han podido discernir ninguna relación entre la búsqueda de GitHub Engineering y el código de ataque Trigemini.c.
CentOS7 suffers from a kernel crashing denial of service issue triggered by an rsyslog daemon vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-02-12 CVE Reserved
- 2017-02-14 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://seclists.org/oss-sec/2017/q1/573 | Mailing List | |
http://www.securityfocus.com/bid/96231 | Third Party Advisory | |
https://access.redhat.com/security/cve/cve-2017-5972 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=1422081 | Issue Tracking | |
https://githubengineering.com/syn-flood-mitigation-with-synsanity | Third Party Advisory | |
https://security-tracker.debian.org/tracker/CVE-2017-5972 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/41350 | 2024-08-05 | |
https://cxsecurity.com/issue/WLB-2017020112 | 2024-08-05 | |
https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.0.0 <= 3.19.8 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.0.0 <= 3.19.8" | - |
Affected
|