The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-02-14T06:30:00
Updated: 2024-08-05T15:18:49.182Z
Reserved: 2017-02-12T00:00:00
Link: CVE-2017-5972
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-02-14T06:59:00.277
Modified: 2024-11-21T03:28:47.887
Link: CVE-2017-5972
Redhat