vulnerability bulletin CVE-2012-4565
Linux kernel: denial of service via TCP Illinois
Synthesis of the vulnerability
When the TCP Illinois congestion control algorithm is enabled, an attacker can monitor TCP statistics, in order to generate a division by zero, which stops the system.Impacted products:
Fedora, Linux, RHEL.
BID-56346, CVE-2012-4565, FEDORA-2012-17462, FEDORA-2012-17479, FEDORA-2012-18691, RHSA-2012:1491-01, RHSA-2012:1580-01, VIGILANCE-VUL-12103.
Description of the vulnerability
The "TCP Illinois" protocol is used to control TCP congestions. It is enabled with:
sysctl -w net.ipv4.tcp_congestion_control=illinois
The tcp_illinois_info() function of the net/ipv4/tcp_illinois.c file generates usage statistics for TCP Illinois. However, when the TCP socket is used simultaneously, a counter can be set to zero. A division by zero then occurs in the tcp_illinois_info() function.
When the TCP Illinois congestion control algorithm is enabled, an attacker can therefore monitor TCP statistics, in order to generate a division by zero, which stops the system.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides a networks vulnerabilities patch
. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.