Vulnerability identifier: #VU89895
Vulnerability risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-451
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to an error within the tcp_ack() function in net/ipv4/tcp_input.c, which can result in system accepting ACK responses for bytes that were never sent. A remote attacker can perform spoofing attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
http://git.kernel.org/stable/c/69eae75ca5255e876628ac5cee9eaab31f644b57
http://git.kernel.org/stable/c/458f07ffeccd17f99942311e09ef574ddf4a414a
http://git.kernel.org/stable/c/7ffff0cc929fdfc62a74b384c4903d6496c910f0
http://git.kernel.org/stable/c/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a
http://git.kernel.org/stable/c/0d4e0afdd6658cd21dd5be61880411a2553fd1fc
http://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440
http://git.kernel.org/stable/c/2087d53a66e97a5eb5d1bf558d5bef9e5f891757
http://git.kernel.org/stable/c/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.