The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2017-02-14T06:30:00

Updated: 2024-08-05T15:18:49.182Z

Reserved: 2017-02-12T00:00:00

Link: CVE-2017-5972

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2017-02-14T06:59:00.277

Modified: 2020-07-31T20:35:05.037

Link: CVE-2017-5972

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-02-12T00:00:00Z

Links: CVE-2017-5972 - Bugzilla