Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 8 Oct 2018 10:40:23 +0800 (CST)
From: luo  <a4651386@....com>
To: "Solar Designer" <solar@...nwall.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE-2018-17977: CentOS ipsec remote denial of
 service vulnerability

All security servers and clients need to have the IPSec function enabled, which is what ah_add does, that is to say, all IPSec servers or clients, if you use the desktop version of centos, there will be such a remote denial of service problem.


Oh, sorry, maybe I didn't explain it.

This is the same as what ah_add does. The only difference is that ah_add makes the encryption length 0. This makes it easier for me to write POC. In reality, the longer the encryption length, the more the denial of service will be.In other words, under the real production environment, the ipsec denial service effect will be more obvious.








At 2018-10-06 00:54:06, "Solar Designer" <solar@...nwall.com> wrote:
>On Fri, Oct 05, 2018 at 11:46:07PM +0800, luo wrote:
>> I don't know if it is correct to publish the complete information.
>
>It is.  Linking to temporary resources like Google Drive isn't great,
>but luckily your message itself includes some detail.
>
>> > The Linux kernel 4.14.67 mishandles certain interaction among XFRM
>> > Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which
>> > allows local users to cause a denial of service (memory consumption
>> > and system hang) by leveraging root access to execute crafted
>> > applications, as demonstrated on CentOS 7.
>
>Since you say that "leveraging root access to execute crafted
>applications" is required, how is this a security issue?  Also, since
>this setup has to be prepared locally, how is the attack "remote"?
>
>In other words, would a sysadmin plausibly make this kind of custom
>local setup, and why?  If the answer is no, then I think there's no
>security issue here.
>
>Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.