[Video] A CVE-2016-5696 sebezhetőség kihasználása

Probléma: net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack

Érintett kernelverziók: Linux 3.6 - Linux 4.7

Tanulmány: Off-Path TCP Exploits: Global Rate Limit Considered Dangerous

Cikk: Linux security backfires: Flaw lets hackers inject malware into downloads, disrupt Tor users, etc


A /etc/sysctl.conf-ba:

net.ipv4.tcp_challenge_ack_limit = 999999999


sysctl -p