First published: Tue Jul 12 2016(Updated: )
A flaw was found in the implementation of the Linux kernels handling of networking challenge ack where an attacker is able to determine the shared counter. This may allow an attacker located on different subnet to inject or take over a TCP connection between a server and client without having to be a traditional Man In the Middle (MITM) style attack. OSS-Security post: <a href="http://seclists.org/oss-sec/2016/q3/44">http://seclists.org/oss-sec/2016/q3/44</a> Upstream patch: <a href="https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758">https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | <=7.0 | |
Oracle VM Server | =3.3 | |
Oracle VM Server | =3.4 | |
Linux Linux kernel | <=4.6.6 | |
redhat/kernel | <4.7.1 | 4.7.1 |
redhat/kernel | <4.6.7 | 4.6.7 |
redhat/kernel | <4.4.18 | 4.4.18 |
redhat/kernel | <3.14.76 | 3.14.76 |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
Set the net.ipv4.tcp_challenge_ack_limit sysctl to some absurdly large number (as described in the lwn article referenced above)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5696 is a vulnerability in the Linux kernel before version 4.7 that allows remote attackers to hijack TCP sessions via a blind in-window attack.
CVE-2016-5696 affects the Linux kernel versions before 4.7, making it vulnerable to remote attackers who can hijack TCP sessions.
CVE-2016-5696 is considered a high severity vulnerability with a severity value of 7.
Linux kernel versions before 4.7, such as 3.2.0-1672.98, are affected by CVE-2016-5696.
Yes, updating the Linux kernel to version 4.7 or later will fix the vulnerability.