漏洞信息详情
Linux内核路由缓冲条目远程拒绝服务攻击漏洞
- CNNVD编号:CNNVD-200305-073
- 危害等级: 中危
- CVE编号:
CVE-2003-0244
- 漏洞类型:
设计错误
- 发布时间:
2003-05-27
- 威胁类型:
远程
- 更新时间:
2005-10-20
- 厂 商:
linux - 漏洞来源:
Scott A. Crosby & … -
漏洞简介
Linux Kernel是开放源代码的Linux内核系统。
Linux内核网络代码的HASH表实现存在缺陷,远程攻击者可以利用这个漏洞消耗目标机器大量资源,不能对新的包进行路由,导致拒绝服务攻击。
路由缓冲用于缓冲路由通信,以对后续的转发进行判断,当包达到的时候,IP路由代码就会检查通信包并根据路由缓冲进行判断,如果存在缓冲信息,就会重用,否则将产生新路由。Linux内核的网络代码在处理IP头具有相同IPv4源和目的地址,及相同TOS值的包存在缺陷,攻击者精心构建上面描述的包发送给Linux,可导致每个包的路由条目连接到相同的HASH链中,这就使得当路由列表很长的时查找会变的非常消耗资源,因此大量发送此类包,可导致服务器消耗大量系统资源而产生拒绝服务。根据测试,一般每秒发400个此类包可使受攻击的系统消耗4G的RAM。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
* Florian Weimer提供非官方解决方案:
使用iptables设置rate限制或者降低路由缓冲大小。路由缓冲大小可以使用/proc接口来减少。不过选择设置rate限制比较复杂,因此建议采用缓冲大小减少的办法,不过此方法会减低部分路由性能:
# echo 4096 > /proc/sys/net/ipv4/route/max_size
# echo 2048 > /proc/sys/net/ipv4/route/gc_thresh
#
厂商补丁:
RedHat
——
RedHat已经为此发布了一个安全公告(RHSA-2003:172-00)以及相应补丁:
RHSA-2003:172-00:Updated 2.4 kernel fixes security vulnerabilities and various bugs
链接:https://www.redhat.com/support/errata/RHSA-2003-172.html” target=”_blank”>https://www.redhat.com/support/errata/RHSA-2003-172.html
补丁下载:
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.20-13.7.src.rpm
athlon:
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.20-13.7.athlon.rpm
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.20-13.7.athlon.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.20-13.7.i386.rpm
i586:
ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.20-13.7.i586.rpm
ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.20-13.7.i586.rpm
i686:
ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.20-13.7.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.20-13.7.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.20-13.7.i686.rpm
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.20-13.7.src.rpm
athlon:
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.20-13.7.athlon.rpm
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.20-13.7.athlon.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.20-13.7.i386.rpm
i586:
ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.20-13.7.i586.rpm
ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.20-13.7.i586.rpm
i686:
ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.20-13.7.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.20-13.7.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.20-13.7.i686.rpm
Red Hat Linux 7.3:
SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.20-13.7.src.rpm
athlon:
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.20-13.7.athlon.rpm
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.20-13.7.athlon.rpm
i386:
ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.20-13.7.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.20-13.7.i386.rpm
i586:
ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.20-13.7.i586.rpm
ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.20-13.7.i586.rpm
i686:
ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.20-13.7.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.20-13.7.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.20-13.7.i686.rpm
Red Hat Linux 8.0:
SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.20-13.8.src.rpm
ftp://updates.redhat.com/8.0/en/os/SRPMS/oprofile-0.4-44.8.1.src.rpm
athlon:
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.20-13.8.athlon.rpm
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.20-13.8.athlon.rpm
i386:
ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.20-13.8.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.20-13.8.i386.rpm
来源: REDHAT
名称: RHSA-2003:145
链接:http://www.redhat.com/support/errata/RHSA-2003-145.html
来源: DEBIAN
名称: DSA-311
链接:http://www.debian.org/security/2003/dsa-311
来源: REDHAT
名称: RHSA-2003:172
链接:http://www.redhat.com/support/errata/RHSA-2003-172.html
来源: REDHAT
名称: RHSA-2003:147
链接:http://www.redhat.com/support/errata/RHSA-2003-147.html
来源: www.enyo.de
链接:http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html
来源: DEBIAN
名称: DSA-442
链接:http://www.debian.org/security/2004/dsa-442
来源: DEBIAN
名称: DSA-336
链接:http://www.debian.org/security/2003/dsa-336
来源: DEBIAN
名称: DSA-332
链接:http://www.debian.org/security/2003/dsa-332
来源: DEBIAN
名称: DSA-312
链接:http://www.debian.org/security/2003/dsa-312
来源: BUGTRAQ
名称: 20030618 [slackware-security] 2.4.21 kernels available (SSA:2003-168-01)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=105595901923063&w=2
来源: ENGARDE
名称: ESA-20030515-017
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=105301461726555&w=2
来源: VULNWATCH
名称: 20030517 Algorithmic Complexity Attacks and the Linux Networking Code
链接:http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html
来源: XF
名称: data-algorithmic-complexity-dos(15382)
链接:http://xforce.iss.net/xforce/xfdb/15382
来源: BID
名称: 7601
链接:http://www.securityfocus.com/bid/7601
来源: SECUNIA
名称: 8786
链接:http://www.secunia.com/advisories/8786/
来源: MANDRAKE
名称: MDKSA-2003:074
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2003:074
来源: MANDRAKE
名称: MDKSA-2003:066
链接:http://www.mandriva.com/security/advisories?name=MDKSA-2003:066
来源: marc.theaimsgroup.com
链接:http://marc.theaimsgroup.com/?l=linux-kernel&m=104956079213417
来源: US Government Resource: oval:org.mitre.oval:def:261
名称: oval:org.mitre.oval:def:261
链接:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:261