SuSE: 2009-047: TCP Denial of Service Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2009:047
Date: Fri, 02 Oct 2009 10:00:00 +0000
Affected Products: All SUSE Linux and openSUSE products
Vulnerability Type: remote denial of service
Severity (1-10): 6
SUSE Default Package: yes
Cross-References: CVE-2008-4609
FICORA #193744
CERT VU#943657
Content of This Advisory:
1) Security Vulnerability Resolved:
TCP/IP denial of service attacks
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Pending Vulnerabilities, Solutions, and Work-Arounds:
Please see SUSE Security Summary Report.
5) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
Outpost24 AB researchers Robert E. Lee and Jack C. Louis have found
TCP/IP denial of service vulnerabilities which allow remote attackers to allocate resources (memory and socket slots) on a targeted system
indefinitely and so may cause a denial of the services on the
attacked machine.
The attack requires the attacker to be able to establish TCP/IP
connections on the machine. If all incoming connections are blocked,
the system is not affected.
The attacks itself are exploiting specific design limitations in the
TCP/IP protocol.
The upstream Linux kernel developers decided not to release updates at
this time, so SUSE also does not plan to release updates to resolve
this issue. Refer to the Workarounds section for suggestions on
limiting the attack.
Further references and information on this issue can be found on the
CERT-FI page:
https://www.kyberturvallisuuskeskus.fi/fi
And in a generic paper on TCP/IP denial of service attacks:
SUSE wishes to thank Outpost AB and CERT-FI for reporting these issues.
2) Solution or Work-Around
As these attacks look like valid accesses to your internet facing
services generally blocking them will not be possible.
Options are to by-host limit incoming TCP/IP connections (before they
are accepted) or block out sub nets if you see attacks coming from them.
With today's botnets this will be difficult as any such blocks could
be worked around by attackers.
3) Special Instructions and Notes
Denial of service attack patterns these days are mostly flooding
using large distributed botnets.
Attackers will probably chose these more common methods instead of
this more subtle one.
______________________________________________________________________________
4) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
5) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References