Experts warn of TCP vulnerability
Network infrastructure providers and companies' internal networks called the most vulnerable to DOS attacks
IDG News Service - Internet security experts warned of a serious security vulnerability in the Transmission Control Protocol (TCP), a critical communications protocol used on the majority of computer networks in the world, according to an advisory from the U.K.'s National Infrastructure Security Co-ordination Centre (NISCC).
The hole exists in all implementations of TCP that comply with the Internet Engineering Task Force's TCP specification. By exploiting the holes, malicious hackers could cause TCP sessions to end prematurely, creating a denial-of-service attack. The TCP vulnerability could also disrupt communications between routers on the Internet by interrupting BGP (Border Gateway Protocol) sessions that use TCP, the NISCC said.
The U.S. CERT Coordination Center issued a warning yesterday about the vulnerability. The warning cited an almost 3-year-old advisory and said sustained exploitation of the hole could lead to a DOS attack affecting "portions of the Internet community."
BGP is the most common routing protocol used by major external routers on the Internet. Major Internet service providers use BGP to configure redundant high-speed connections and to coordinate with other ISPs and peers, said Dan Ingevaldson, research director at Internet Security Systems Inc. (ISS).
"It's the protocol that handles the big pipes on the Internet," he said.
NISCC and the U.S. CERT issued their advisories after a security researcher, Paul Watson, described the problem in a paper called "Slipping in the Window: TCP Reset Attacks." Watson will be presenting the paper at the CanSecWest 2004 security conference in Vancouver, British Columbia, this week.
Watson discovered that the current TCP standard allows a malicious hacker to easily guess a unique 32-bit number needed to reset an established TCP connection, because the standard allows sequence numbers in a range of values to be accepted rather than exact matches, according to the NISCC advisory.
By spoofing the source IP address and the TCP port and then randomly guessing the unique sequence number, an attacker could cause an active TCP session to terminate.
Networking experts have known about the potential for such attacks for almost 20 years. However, as Internet use and the use of broadband Internet connections has grown over the years, ISPs and others have gradually increased the size of the window, or range of acceptable sequence numbers that they permit to reset a connection, making a successful DOS attack more plausible, Ingevaldson said.
BGP sessions are particularly vulnerable to such attacks because they are longer, more predictable connections that often take place between two devices with published IP addresses, he said.
"Attackers know where they are and where they're going. They know the ports on either side that are being
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts