Linux Flaw Allows Attackers to Hijack Web Connections

Researchers discovered that a Transmission Control Protocol (TCP) specification implemented in Linux creates a vulnerability that can be exploited to terminate connections and conduct data injection attacks.

The flaw, tracked as CVE-2016-5696, is related to a feature described in RFC 5961, which should make it more difficult to launch off-path TCP spoofing attacks. The specification was formulated in 2010, but it has not been fully implemented in Windows, Mac OS X, and FreeBSD-based operating systems. However, the feature has been implemented in the Linux kernel since version 3.6, released in 2012.

A team of researchers from the University of California, Riverside and the U.S. Army Research Laboratory identified an attack method that allows a blind, off-path attacker to intercept TCP-based connections between two hosts on the Internet.

Researchers noted that data cannot be injected into HTTPS communications, but the connection can still be terminated using this method. One attack scenario described by the experts involves targeting Tor by disrupting connections between certain relays so that users are forced to use attacker-controlled exit relays.

24 Comments

  1. 2016-08-30 12:15 am
    • 2016-08-30 2:26 am
      • 2016-08-30 6:32 am
        • 2016-08-30 7:21 am
          • 2016-08-30 9:09 am
          • 2016-08-30 5:35 pm
        • 2016-08-30 3:20 pm
          • 2016-08-30 3:34 pm
          • 2016-08-30 4:18 pm
          • 2016-08-30 4:28 pm
          • 2016-08-30 5:11 pm
          • 2016-08-30 7:16 pm
          • 2016-08-30 9:28 pm
          • 2016-08-30 7:42 pm
          • 2016-08-30 9:46 pm
          • 2016-08-30 10:30 pm
          • 2016-08-30 8:09 pm
          • 2016-08-30 8:23 pm
          • 2016-08-30 4:37 pm
    • 2016-08-30 12:25 pm
  2. 2016-08-30 12:26 am
    • 2016-08-30 4:14 pm
    • 2016-08-30 4:38 pm
  3. 2016-08-31 2:40 pm