[Bug 1753] New: Netfilter does not check the sequence number strictly, a spoofed TCP RST packet with an in-window sequence number can cause the change of the mapping state

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Tue May 28 16:30:29 CEST 2024


https://bugzilla.netfilter.org/show_bug.cgi?id=1753

            Bug ID: 1753
           Summary: Netfilter does not check the sequence number strictly,
                    a spoofed TCP RST packet with an in-window sequence
                    number can cause the change of the mapping state
           Product: netfilter/iptables
           Version: unspecified
          Hardware: All
                OS: All
            Status: NEW
          Severity: critical
          Priority: P5
         Component: nf_conntrack
          Assignee: netfilter-buglog at lists.netfilter.org
          Reporter: yangyx22 at mails.tsinghua.edu.cn

We discover a fundamental vulnerability in Netfilter when it receives spoofed
TCP RST packets, which can be exploited by a malicious insider to conduct a TCP
hijacking attack to other clients under the same NAT device. The root cause
resides in the insufficient validation of TCP sequence numbers of TCP reset
packets received by Netfilter.

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20240528/b2cc1bfb/attachment.html>


More information about the netfilter-buglog mailing list