低危 Linux Kernel up to 4.4.181/4.9.181/4.14.126/4.19.51/5.1.10 TCP Retransmission Queue 拒绝服务漏洞

CVE编号

CVE-2019-11478

利用情况

暂无

补丁情况

官方补丁

披露时间

2019-06-19
漏洞描述
Jonathan Looney发现,在处理某些 TCP Selective Acknowledgment (SACK) sequence时,Linux内核中tcp_fragment中的TCP retransmission queue implementation可能会被分段。远程攻击者可以使用它来导致拒绝服务。这已在稳定的内核版本4.4.182,4.9.182,4.14.127,4.19.52,5.1.11中修复,并在commit f070ef2ac66716357066b683fb0baf55f8191a2e中修复。

解决建议

安全系统补丁


参考链接
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice...
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice...
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice...
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
https://access.redhat.com/errata/RHSA-2019:1699
https://access.redhat.com/security/vulnerabilities/tcpsack
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070...
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-pa...
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007
https://seclists.org/bugtraq/2019/Jul/30
https://security.netapp.com/advisory/ntap-20190625-0001/
https://support.f5.com/csp/article/K26618426
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://www.kb.cert.org/vuls/id/905115
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_28
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_access_policy_manager * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_access_policy_manager 15.0.0 -
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_advanced_firewall_manager 15.0.0 -
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_analytics * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_analytics 15.0.0 -
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_application_acceleration_manager * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_application_acceleration_manager 15.0.0 -
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_application_security_manager * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_application_security_manager 15.0.0 -
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_domain_name_system * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_domain_name_system 15.0.0 -
运行在以下环境
应用 f5 big-ip_edge_gateway * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_edge_gateway * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_edge_gateway * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_edge_gateway * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_edge_gateway 15.0.0 -
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_fraud_protection_service * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_fraud_protection_service 15.0.0 -
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_global_traffic_manager * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_global_traffic_manager 15.0.0 -
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_link_controller * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_link_controller 15.0.0 -
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_local_traffic_manager * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_local_traffic_manager 15.0.0 -
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_policy_enforcement_manager 15.0.0 -
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
11.5.2
Up to
(including)
11.6.4
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
12.1.0
Up to
(including)
12.1.4
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
13.1.0
Up to
(including)
13.1.1
运行在以下环境
应用 f5 big-ip_webaccelerator * From
(including)
14.0.0
Up to
(including)
14.1.0
运行在以下环境
应用 f5 big-ip_webaccelerator 15.0.0 -
运行在以下环境
应用 f5 traffix_sdc * From
(including)
5.0.0
Up to
(including)
5.1.0
运行在以下环境
应用 pulsesecure pulse_connect_secure - -
运行在以下环境
应用 pulsesecure pulse_policy_secure - -
运行在以下环境
应用 pulsesecure pulse_secure_virtual_application_delivery_controller - -
运行在以下环境
应用 redhat enterprise_linux_atomic_host - -
运行在以下环境
应用 redhat enterprise_mrg 2.0 -
运行在以下环境
系统 amazon_2 kernel * Up to
(excluding)
4.14.123-111.109.amzn2
运行在以下环境
系统 amazon_AMI kernel * Up to
(excluding)
4.14.123-86.109.amzn1
运行在以下环境
系统 canonical ubuntu_linux 12.04 -
运行在以下环境
系统 canonical ubuntu_linux 14.04 -
运行在以下环境
系统 canonical ubuntu_linux 16.04 -
运行在以下环境
系统 canonical ubuntu_linux 18.04 -
运行在以下环境
系统 canonical ubuntu_linux 18.10 -
运行在以下环境
系统 canonical ubuntu_linux 19.04 -
运行在以下环境
系统 centos_6 kernel * Up to
(excluding)
2.6.32-754.15.3.el6
运行在以下环境
系统 centos_7 kernel * Up to
(excluding)
3.10.0-957.21.3.el7
运行在以下环境
系统 debian_10 linux * Up to
(excluding)
4.19.37-4
运行在以下环境
系统 debian_11 linux * Up to
(excluding)
4.19.37-4
运行在以下环境
系统 debian_12 linux * Up to
(excluding)
4.19.37-4
运行在以下环境
系统 fedora_29 kernel * Up to
(excluding)
5.1.11-200.fc29
运行在以下环境
系统 fedora_30 kernel * Up to
(excluding)
5.1.11-300.fc30
运行在以下环境
系统 linux linux_kernel * Up to
(excluding)
4.4.182
运行在以下环境
系统 linux linux_kernel * From
(including)
4.10
Up to
(excluding)
4.14.127
运行在以下环境
系统 linux linux_kernel * From
(including)
4.15
Up to
(excluding)
4.19.52
运行在以下环境
系统 linux linux_kernel * From
(including)
4.20
Up to
(excluding)
5.1.11
运行在以下环境
系统 linux linux_kernel * From
(including)
4.5
Up to
(excluding)
4.9.182
运行在以下环境
系统 opensuse_Leap_15.0 kernel * Up to
(excluding)
4.12.14-lp150.12.64.1
运行在以下环境
系统 opensuse_Leap_15.1 kernel * Up to
(excluding)
4.12.14-lp151.28.7.1
运行在以下环境
系统 opensuse_Leap_42.3 kernel * Up to
(excluding)
4.4.180-102.1
运行在以下环境
系统 oracle_5 kernel * Up to
(excluding)
2.6.39-400.312.2.el5uek
运行在以下环境
系统 oracle_6 kernel * Up to
(excluding)
4.1.12-124.33.4.el6uek
运行在以下环境
系统 oracle_7 kernel * Up to
(excluding)
3.10.0-957.21.3.el7
运行在以下环境
系统 oracle_8 kernel * Up to
(excluding)
4.18.0-80.4.2.el8_0
运行在以下环境
系统 redhat enterprise_linux 5.0 -
运行在以下环境
系统 redhat enterprise_linux 6.0 -
运行在以下环境
系统 redhat enterprise_linux 7.0 -
运行在以下环境
系统 redhat enterprise_linux 8.0 -
运行在以下环境
系统 redhat enterprise_linux_aus 6.5 -
运行在以下环境
系统 redhat enterprise_linux_aus 6.6 -
运行在以下环境
系统 redhat enterprise_linux_eus 7.4 -
运行在以下环境
系统 redhat enterprise_linux_eus 7.5 -
运行在以下环境
系统 redhat_7 kernel * Up to
(excluding)
3.10.0-957.21.3.el7
运行在以下环境
系统 redhat_8 kernel * Up to
(excluding)
4.18.0-80.4.2.el8_0
运行在以下环境
系统 suse_12_SP3 kernel * Up to
(excluding)
4.4.180-4.31.1
运行在以下环境
系统 suse_12_SP4 kernel * Up to
(excluding)
4.12.14-95.24.1
运行在以下环境
系统 ubuntu_16.04 linux * Up to
(excluding)
4.15.0-52.56~16.04.1
运行在以下环境
系统 ubuntu_18.04 linux * Up to
(excluding)
4.15.0-1034.36
阿里云评分
3.1
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-400 未加控制的资源消耗(资源穷尽)
阿里云安全产品覆盖情况