Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
CVE-2018-5390
Oracle has issued an update for kernel-uek included in Oracle VM Server for x86 to patch a vulnerability that could cause a DoS.
IMPACT: NORMAL
PUBLISH DATE: 17-09-2018
OVERVIEW
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. Oracle has released updates for the vulnerability.
ANALYSIS
Linux kernel’s handling of specially crafted TCP packets was found to be flawed with an error called SegmentSmack. The flaw can be exploited by a remote attacker by injecting specially modified packets in the out_of_order_queue to induce expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions, within ongoing TCP sessions. This could lead to a CPU saturation and hence a denial of service on the system.
Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.
This patch series makes sure we cut cpu cycles enough to render the attack not critical.
AFFECTED PRODUCTS
Oracle VM Server 3.x
UPDATES
Apply updated packages concerning Oracle VM Server for x86 version 3.4.
Follow vendor’s advisory for further help.
https://linux.oracle.com/errata/OVMSA-2018-0256.html