SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Solaris Vendors:   Sun
Solaris TCP SYN Attack Protection Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1019989
SecurityTracker URL:  http://securitytracker.com/id/1019989
CVE Reference:   CVE-2008-2121   (Links to External Site)
Updated:  May 13 2008
Original Entry Date:  May 8 2008
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8, 9, 10
Description:   A vulnerability was reported in Solaris. A remote user can cause denial of service conditions in certain situations.

When a target system is undergoing a TCP SYN flood attack, a remote user can cause the target system to be slow to accept new network connections, causing the network connections to time out before establishing a connection. On uniprocessor systems, the remote user can cause excessive CPU usage.

Systems that are configured with a 'tcp_conn_req_max_q0' value that is signficantly higher than the default value of 1024 are affected.

Impact:   A remote user can cause denial of service conditions.
Solution:   The vendor has issued a fix.

SPARC Platform

* Solaris 8 with patch116965-33 or later
* Solaris 9 with patch 114344-35 or later
* Solaris 10 with patch 119998-01 or later

x86 Platform

* Solaris 8 with patch 116966-32 or later
* Solaris 9 with patch 119435-23 or later
* Solaris 10 with patch 119999-01 or later

Note: There are additional Solaris 8 and 9 patches which list 6402737 in their README, however these patches are not required to address the issue described in this Sun Alert. These additional patches deliver an updated kernel debugger (kadb(1M)). The patch-IDs are:

SPARC Platform

* Solaris 8 patch 117350-54 or later
* Solaris 9 patch 122300-25 or later

x86 Platform

* Solaris 8 patch 117351-54 or later
* Solaris 9 patch 122301-25 or later

The vendor's advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-200864-1

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-66-200864-1 (Links to External Site)
Cause:   State error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Wed, 7 May 2008 23:39:46 -0400
Subject:  http://sunsolve.sun.com/search/document.do?assetkey=1-66-200864-1

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC