4.9 • 696 Ratings
🗓️ 8 August 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, August 8, 2018 edition of the Sansonet Storm Center's Stormcast. |
0:07.6 | My name is Johannes Ulrich, and today I'm recording from San Antonio, Texas. |
0:12.8 | A new denial of service vulnerability against the most recent Linux kernel has made the new sort of big time today in part because of the |
0:23.4 | catchy name associated with this vulnerability. Segment smack as the vulnerability has been |
0:30.7 | branded is an issue with the 4.9 Linux kernel. Now before you look at your system and find out that you're not running |
0:41.4 | the 4.9 kernel, be aware that some distributions like for example Redhead have ported back |
0:50.6 | the TCP stack from 4.9 into their version of the Linux kernel. So even though it |
0:57.4 | doesn't say 4.9, you are using the vulnerable code. So for example, Redhead Enterprise |
1:06.3 | 6 and 7 are vulnerable. Suse 15 is vulnerable, as well as Bantu 1804, which was just released. |
1:17.2 | Patches should be out by now for vulnerable systems. |
1:20.4 | So what's the risk here and what's the problem really? |
1:23.1 | The risk, first of all, is if you have an exposed server, an attacker could connect to that server, |
1:29.3 | and by sending very few packets essentially lead to a denial of service condition. |
1:35.3 | The exact nature of the vulnerability isn't known yet, but it is related to the out-of-order queue, |
1:42.3 | which essentially is where TCP keeps sort of random |
1:45.8 | packets around that don't fit yet into a sampled TCP stream. Now, best guess here is |
1:53.5 | that probably this attack involves sending a lot of out-of-order packets, maybe also overlapping |
1:59.9 | segments. So anything along these lines is |
2:03.0 | probably to blame for this vulnerability. But again, the hacker cannot spoof their IP address |
2:09.2 | because they first need an established TCP connection. And then they at least occasionally |
2:14.6 | need to send additional packets. So again again this cannot be spoofed. |
2:19.3 | At this point, I wouldn't really worry about it too much. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.