Linux内核路由缓冲条目远程拒绝服务攻击漏洞

漏洞信息详情

Linux内核路由缓冲条目远程拒绝服务攻击漏洞

漏洞简介

Linux Kernel是开放源代码的Linux内核系统。
Linux内核网络代码的HASH表实现存在缺陷,远程攻击者可以利用这个漏洞消耗目标机器大量资源,不能对新的包进行路由,导致拒绝服务攻击。
路由缓冲用于缓冲路由通信,以对后续的转发进行判断,当包达到的时候,IP路由代码就会检查通信包并根据路由缓冲进行判断,如果存在缓冲信息,就会重用,否则将产生新路由。Linux内核的网络代码在处理IP头具有相同IPv4源和目的地址,及相同TOS值的包存在缺陷,攻击者精心构建上面描述的包发送给Linux,可导致每个包的路由条目连接到相同的HASH链中,这就使得当路由列表很长的时查找会变的非常消耗资源,因此大量发送此类包,可导致服务器消耗大量系统资源而产生拒绝服务。根据测试,一般每秒发400个此类包可使受攻击的系统消耗4G的RAM。

漏洞公告

临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:

* Florian Weimer提供非官方解决方案:

使用iptables设置rate限制或者降低路由缓冲大小。路由缓冲大小可以使用/proc接口来减少。不过选择设置rate限制比较复杂,因此建议采用缓冲大小减少的办法,不过此方法会减低部分路由性能:

# echo 4096 > /proc/sys/net/ipv4/route/max_size

# echo 2048 > /proc/sys/net/ipv4/route/gc_thresh

#
厂商补丁:
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2003:172-00)以及相应补丁:

RHSA-2003:172-00:Updated 2.4 kernel fixes security vulnerabilities and various bugs

链接:https://www.redhat.com/support/errata/RHSA-2003-172.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2003-172.html

补丁下载:

Red Hat Linux 7.1:

SRPMS:

ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.20-13.7.src.rpm

athlon:

ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.20-13.7.athlon.rpm

ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.20-13.7.athlon.rpm

i386:

ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.20-13.7.i386.rpm

i586:

ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.20-13.7.i586.rpm

ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.20-13.7.i586.rpm

i686:

ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.20-13.7.i686.rpm

ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.20-13.7.i686.rpm

ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.20-13.7.i686.rpm

Red Hat Linux 7.2:

SRPMS:

ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.20-13.7.src.rpm

athlon:

ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.20-13.7.athlon.rpm

ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.20-13.7.athlon.rpm

i386:

ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.20-13.7.i386.rpm

i586:

ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.20-13.7.i586.rpm

ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.20-13.7.i586.rpm

i686:

ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.20-13.7.i686.rpm

ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.20-13.7.i686.rpm

ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.20-13.7.i686.rpm

Red Hat Linux 7.3:

SRPMS:

ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.20-13.7.src.rpm

athlon:

ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.20-13.7.athlon.rpm

ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.20-13.7.athlon.rpm

i386:

ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.20-13.7.i386.rpm

ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.20-13.7.i386.rpm

i586:

ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.20-13.7.i586.rpm

ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.20-13.7.i586.rpm

i686:

ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.20-13.7.i686.rpm

ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.20-13.7.i686.rpm

ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.20-13.7.i686.rpm

Red Hat Linux 8.0:

SRPMS:

ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.20-13.8.src.rpm

ftp://updates.redhat.com/8.0/en/os/SRPMS/oprofile-0.4-44.8.1.src.rpm

athlon:

ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.20-13.8.athlon.rpm

ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.20-13.8.athlon.rpm

i386:

ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.20-13.8.i386.rpm

ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.20-13.8.i386.rpm


来源: REDHAT
名称: RHSA-2003:145
链接:http://www.redhat.com/support/errata/RHSA-2003-145.html

来源: DEBIAN
名称: DSA-311
链接:http://www.debian.org/security/2003/dsa-311

来源: REDHAT
名称: RHSA-2003:172
链接:http://www.redhat.com/support/errata/RHSA-2003-172.html

来源: REDHAT
名称: RHSA-2003:147
链接:http://www.redhat.com/support/errata/RHSA-2003-147.html

来源: www.enyo.de
链接:http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html

来源: DEBIAN
名称: DSA-442
链接:http://www.debian.org/security/2004/dsa-442

来源: DEBIAN
名称: DSA-336
链接:http://www.debian.org/security/2003/dsa-336

来源: DEBIAN
名称: DSA-332
链接:http://www.debian.org/security/2003/dsa-332

来源: DEBIAN
名称: DSA-312
链接:http://www.debian.org/security/2003/dsa-312

来源: BUGTRAQ
名称: 20030618 [slackware-security] 2.4.21 kernels available (SSA:2003-168-01)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=105595901923063&w=2

来源: ENGARDE
名称: ESA-20030515-017
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=105301461726555&w=2

来源: VULNWATCH
名称: 20030517 Algorithmic Complexity Attacks and the Linux Networking Code
链接:http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html

来源: XF
名称: data-algorithmic-complexity-dos(15382)
链接:http://xforce.iss.net/xforce/xfdb/15382

来源: BID
名称: 7601
链接:http://www.securityfocus.com/bid/7601

来源: SECUNIA
名称: 8786
链接:http://www.secunia.com/advisories/8786/

来源: MANDRAKE
名称: MDKSA-2003:074
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2003:074

来源: MANDRAKE
名称: MDKSA-2003:066
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2003:066

来源: marc.theaimsgroup.com
链接:http://marc.theaimsgroup.com/?l=linux-kernel&m=104956079213417

来源: US Government Resource: oval:org.mitre.oval:def:261
名称: oval:org.mitre.oval:def:261
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:261

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享