Rapid7 Vulnerability & Exploit Database

RHSA-2001:142: kernel 2.2 and 2.4: syncookie vulnerability

Back to Search

RHSA-2001:142: kernel 2.2 and 2.4: syncookie vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
12/06/2001
Created
07/25/2018
Added
10/28/2005
Modified
06/21/2018

Description

Syncookies are used to protect a system against certain Denial Of Service (DOS) attacks. A flaw in this mechanism has been found which can be used to circumvent certain types of firewall configurations. Note: syncookies are not enabled in the default installation of Red Hat Linux but many server administrators do enable syncookies.

Syncookies, while not enabled in default installations of Red Hat Linux, are used to protect an Internet server against a certain type of DoS attack--the so called "synflood"--by using a cryptographic challenge protocol which ensures legitimate users can keep using the server. Under an attack, the TCP/IP layer will, instead of just accepting new connections, send back the challenge and only accept the connections in the second phase ("syn ack") of the TCP/IP handshake (where the other party returns the challenge value). The DoS attack, which consists of sending as many first phase ("syn") packets as possible will be neutralized because system resources are only used as part of the second phase. Certain firewall configurations only filter the first phase ("syn") packets to prevent connections to specific services. These systems are vulnerable when an attacker can both force a system into flood protection state (by starting a synflood attack on a non-firewalled port) and guess the cryptographic challenge of a firewalled port. While the cryptographic hash used is strong, the number of bits available is restricted by the TCP protocol header design. With a high speed link and a lot of time, an attacker can eventually succeed in faking a valid cookie and making a connection that a syn only firewall rule might have prohibited. The updated kernels have a modified synflood protection algorithm that now uses a per port "under attack" state so that ports with only a first-phase firewall rule will not use the "under attack" regime even when other, non-firewalled, ports are under attack. In addition, these packages fix a remote denial of service attack against the TUX web server. This attack can only succeed if the TUX web server has been explicitly enabled; it is disabled by default. Thanks to Aidan O'Rawe for finding this bug.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-boot
  • redhat-upgrade-kernel-debug
  • redhat-upgrade-kernel-doc
  • redhat-upgrade-kernel-enterprise
  • redhat-upgrade-kernel-headers
  • redhat-upgrade-kernel-ibcs
  • redhat-upgrade-kernel-jensen
  • redhat-upgrade-kernel-pcmcia-cs
  • redhat-upgrade-kernel-smp
  • redhat-upgrade-kernel-source
  • redhat-upgrade-kernel-utils

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;