vulnerability
F5 Networks: K46514822 (CVE-2016-5696): Linux TCP stack vulnerability CVE-2016-5696
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:N/I:P/A:P) | 08/06/2016 | 02/16/2017 | 09/16/2019 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
08/06/2016
Added
02/16/2017
Modified
09/16/2019
Description
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
Solution
f5-big-ip-upgrade-latest
References
- URL-https://support.f5.com/csp/article/K46514822
- REDHAT-RHSA-2016:1631
- REDHAT-RHSA-2016:1632
- REDHAT-RHSA-2016:1633
- REDHAT-RHSA-2016:1657
- REDHAT-RHSA-2016:1664
- REDHAT-RHSA-2016:1814
- REDHAT-RHSA-2016:1815
- REDHAT-RHSA-2016:1939
- BID-91704
- SECTRACK-1036625
- UBUNTU-USN-3070-1
- UBUNTU-USN-3070-2
- UBUNTU-USN-3070-3
- UBUNTU-USN-3070-4
- UBUNTU-USN-3071-1
- UBUNTU-USN-3071-2
- UBUNTU-USN-3072-1
- UBUNTU-USN-3072-2
- NVD-CVE-2016-5696
- DEBIAN-DLA-609-1
- DEBIAN-DSA-3659

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.