ID CVE-2018-6922
Summary One of the data structures that holds TCP segments in all versions of FreeBSD prior to 11.2-RELEASE-p1, 11.1-RELEASE-p12, and 10.4-RELEASE-p10 uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing to grow linearly with the number of segments in the reassembly queue. An attacker who has the ability to send TCP traffic to a victim system can degrade the victim system's network performance and/or consume excessive CPU by exploiting the inefficiency of TCP reassembly handling, with relatively small bandwidth cost.
References
Vulnerable Configurations
CVSS
Base: None
Impact:
Exploitability:
nessus via4
NASL family FreeBSD Local Security Checks
NASL id FREEBSD_PKG_3C2EEA8C99BF11E88BEEA4BADB2F4699.NASL
description One of the data structures that holds TCP segments uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing to grow linearly with the number of segments in the reassembly queue. Impact : An attacker who has the ability to send TCP traffic to a victim system can degrade the victim system's network performance and/or consume excessive CPU by exploiting the inefficiency of TCP reassembly handling, with relatively small bandwidth cost.
last seen 2018-08-17
modified 2018-08-16
plugin id 111561
published 2018-08-07
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=111561
title FreeBSD : FreeBSD -- Resource exhaustion in TCP reassembly (3c2eea8c-99bf-11e8-8bee-a4badb2f4699)
refmap via4
bid 105058
confirm https://security.netapp.com/advisory/ntap-20180815-0002/
freebsd FreeBSD-SA-18:08
sectrack 1041425
Last major update 09-08-2018 - 14:29
Published 09-08-2018 - 14:29
Last modified 16-08-2018 - 06:29
Back to Top