Ask the Community
Groups
CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack) - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2018-5390</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.<br><br>CVSS3 Base Score 7.5<br>Public Date: 2018-08-06 <br>CWE: CWE-400<br><br> </p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p> Fixed with kernel-2.6.32-754.3.5.el6.x86_64.rpm in Unitrends security update (>=08/16/2018)</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2018-5390%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Ferrata%2FRHSA-2018%3A2390%250D%250Ahttps%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2018-5390%250D%250Ahttps%3A%2F%2Fwww.kb.cert.org%2Fvuls%2Fid%2F962459">https://access.redhat.com/security/cve/cve-2018-5390 https://access.redhat.com/errata/RHSA-2018:2390 https://nvd.nist.gov/vuln/detail/CVE-2018-5390 https://www.kb.cert.org/vuls/id/962459</a></li></ul> </article> </main>