|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Linux kernel: denial of service via TCP Illinois
Synthesis of the vulnerability
When the TCP Illinois congestion control algorithm is enabled, an attacker can monitor TCP statistics, in order to generate a division by zero, which stops the system.
Impacted products: Fedora, Linux, RHEL.
Creation date: 31/10/2012.
Identifiers: BID-56346, CVE-2012-4565, FEDORA-2012-17462, FEDORA-2012-17479, FEDORA-2012-18691, RHSA-2012:1491-01, RHSA-2012:1580-01, VIGILANCE-VUL-12103.
Description of the vulnerability
The "TCP Illinois" protocol is used to control TCP congestions. It is enabled with:
sysctl -w net.ipv4.tcp_congestion_control=illinois
The tcp_illinois_info() function of the net/ipv4/tcp_illinois.c file generates usage statistics for TCP Illinois. However, when the TCP socket is used simultaneously, a counter can be set to zero. A division by zero then occurs in the tcp_illinois_info() function.
When the TCP Illinois congestion control algorithm is enabled, an attacker can therefore monitor TCP statistics, in order to generate a division by zero, which stops the system.
Complete Vigil@nce bulletin.... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a networks vulnerabilities patch. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.