CVE-2017-5972 in Linux Kernel
Résumé (Anglaise)
The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7.
Réserver
12/02/2017
Divulgation
14/02/2017
Entrées
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnérabilité | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 96953 | Linux Kernel TCP Stack déni de service | 399 | Preuve de concept | Non défini | CVE-2017-5972 |