#VU89895 Spoofing attack in Linux kernel


Published: 2024-05-29

Vulnerability identifier: #VU89895

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52881

CWE-ID: CWE-451

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error within the tcp_ack() function in net/ipv4/tcp_input.c, which can result in system accepting ACK responses for bytes that were never sent. A remote attacker can perform spoofing attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/69eae75ca5255e876628ac5cee9eaab31f644b57
http://git.kernel.org/stable/c/458f07ffeccd17f99942311e09ef574ddf4a414a
http://git.kernel.org/stable/c/7ffff0cc929fdfc62a74b384c4903d6496c910f0
http://git.kernel.org/stable/c/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a
http://git.kernel.org/stable/c/0d4e0afdd6658cd21dd5be61880411a2553fd1fc
http://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440
http://git.kernel.org/stable/c/2087d53a66e97a5eb5d1bf558d5bef9e5f891757
http://git.kernel.org/stable/c/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability