<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Linux TCP bug leaves sites vulnerable to serious hijacking attacks</title>
	<atom:link href="http://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 27 Apr 2026 21:44:28 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1506032</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 13:05:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1506032</guid>
		<description><![CDATA[Off-Path TCP Exploits: Global Rate Limit Considered Dangerous 
https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cao
https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf]]></description>
		<content:encoded><![CDATA[<p>Off-Path TCP Exploits: Global Rate Limit Considered Dangerous<br />
<a href="https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cao" rel="nofollow">https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/cao</a><br />
<a href="https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" rel="nofollow">https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1506030</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 13:04:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1506030</guid>
		<description><![CDATA[Linux Traffic Hijack Flaw Also Affects Most Android Phones, Tablets 
https://linux.slashdot.org/story/16/08/15/2038201/linux-traffic-hijack-flaw-also-affects-most-android-phones-tablets

As many as 80 percent of Android devices are vulnerable to a recently disclosed Linux kernel vulnerability. Security firm Lookout said in a blog post on Monday that the flaw affects all phones and tablets that are running Android 4.4 KitKat and later, which comes with the affected Linux kernel 3.6 or newer. According to recent statistics, the number of devices affected might run past 1.4 billion phones and tablets -- including devices running the Android Nougat developer preview. Windows and Macs are not affected by the vulnerability

The exploitability isn&#039;t easy, though.

Linux traffic hijack flaw also affects most Android phones, tablets
About 80 percent of all Android devices are affected, but &quot;exploitability is hard.&quot;
http://www.zdnet.com/article/linux-traffic-hijack-flaw-also-affects-most-android-phones-tablets/

 The flaw, disclosed at the Usenix security conference last week, is complicated and difficult to exploit. If an attacker can pull off an exploit, they could inject malicious code into unencrypted web traffic from &quot;anywhere&quot;. However, the source and destination IP address would need to be known in order to intercept the traffic, adding to the complexity of carrying out a successful attack.

That might not be so difficult for well-resourced attackers, who are in a privileged position on the network, such as nation states.

Even if the connection is encrypted, an attacker could still determine and terminate a connection -- even if they cannot read web traffic. This kind of attack could be used to degrade a privacy and anonymity service, like Tor.]]></description>
		<content:encoded><![CDATA[<p>Linux Traffic Hijack Flaw Also Affects Most Android Phones, Tablets<br />
<a href="https://linux.slashdot.org/story/16/08/15/2038201/linux-traffic-hijack-flaw-also-affects-most-android-phones-tablets" rel="nofollow">https://linux.slashdot.org/story/16/08/15/2038201/linux-traffic-hijack-flaw-also-affects-most-android-phones-tablets</a></p>
<p>As many as 80 percent of Android devices are vulnerable to a recently disclosed Linux kernel vulnerability. Security firm Lookout said in a blog post on Monday that the flaw affects all phones and tablets that are running Android 4.4 KitKat and later, which comes with the affected Linux kernel 3.6 or newer. According to recent statistics, the number of devices affected might run past 1.4 billion phones and tablets &#8212; including devices running the Android Nougat developer preview. Windows and Macs are not affected by the vulnerability</p>
<p>The exploitability isn&#8217;t easy, though.</p>
<p>Linux traffic hijack flaw also affects most Android phones, tablets<br />
About 80 percent of all Android devices are affected, but &#8220;exploitability is hard.&#8221;<br />
<a href="http://www.zdnet.com/article/linux-traffic-hijack-flaw-also-affects-most-android-phones-tablets/" rel="nofollow">http://www.zdnet.com/article/linux-traffic-hijack-flaw-also-affects-most-android-phones-tablets/</a></p>
<p> The flaw, disclosed at the Usenix security conference last week, is complicated and difficult to exploit. If an attacker can pull off an exploit, they could inject malicious code into unencrypted web traffic from &#8220;anywhere&#8221;. However, the source and destination IP address would need to be known in order to intercept the traffic, adding to the complexity of carrying out a successful attack.</p>
<p>That might not be so difficult for well-resourced attackers, who are in a privileged position on the network, such as nation states.</p>
<p>Even if the connection is encrypted, an attacker could still determine and terminate a connection &#8212; even if they cannot read web traffic. This kind of attack could be used to degrade a privacy and anonymity service, like Tor.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1506025</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 12:58:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1506025</guid>
		<description><![CDATA[Also, the latest Android wounded

Last week it was reported widely on all Linux operating systems looming vulnerability, which also applies to Android mobile phones. Now has been specified, that all the 4.4 version is not after the Kit Kat&#039;s Androids are the vulnerability of the victims. Also, a new Android N, or Nougat.

This is the TCP protocol vulnerability, which has been at the heart of Linux, version 3.6 onwards. The latest at the core of the problem is patched, but it still lurks as much as 1.4 billion Android device. This is about 80 per cent of all available Android devices.

A remote attacker can monitor Internet traffic between two machines, interrupt conversation and fed to communicate something wrong, to their own information.

Source: http://etn.fi/index.php?option=com_content&amp;view=article&amp;id=4847:myos-uusin-android-haavoittunut&amp;catid=13&amp;Itemid=101]]></description>
		<content:encoded><![CDATA[<p>Also, the latest Android wounded</p>
<p>Last week it was reported widely on all Linux operating systems looming vulnerability, which also applies to Android mobile phones. Now has been specified, that all the 4.4 version is not after the Kit Kat&#8217;s Androids are the vulnerability of the victims. Also, a new Android N, or Nougat.</p>
<p>This is the TCP protocol vulnerability, which has been at the heart of Linux, version 3.6 onwards. The latest at the core of the problem is patched, but it still lurks as much as 1.4 billion Android device. This is about 80 per cent of all available Android devices.</p>
<p>A remote attacker can monitor Internet traffic between two machines, interrupt conversation and fed to communicate something wrong, to their own information.</p>
<p>Source: <a href="http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4847:myos-uusin-android-haavoittunut&#038;catid=13&#038;Itemid=101" rel="nofollow">http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4847:myos-uusin-android-haavoittunut&#038;catid=13&#038;Itemid=101</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1505974</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 08:45:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1505974</guid>
		<description><![CDATA[Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks
Off-path attack means malicious hackers can be located anywhere on the Internet.
http://arstechnica.com/security/2016/08/linux-bug-leaves-1-4-billion-android-users-vulnerable-to-hijacking-attacks/

An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren&#039;t encrypted, inject malicious code or content into the parties&#039; communications, researchers from mobile security firm Lookout said Monday.

As Ars reported last Wednesday, the flaw first appeared in version 3.6 of the Linux operating system kernel, which was introduced in 2012. In a blog post published Monday, Lookout researchers said that the Linux flaw appears to have been introduced into Android version 4.4 (aka KitKat) and remains present in all future versions, including the latest developer preview of Android Nougat. That tally is based on the Android install base as reported by statistics provider Statista, and it would mean that about 1.4 billion Android devices, or about 80 percent of users, are vulnerable.

&quot;The tl;dr is for Android users to ensure they are encrypting their communications by using VPNs, [or] ensuring the sites they go to are encrypted,&quot; Lookout researcher Andrew Blaich told Ars. &quot;If there&#039;s somewhere they&#039;re going to that they don&#039;t want tracked, always ensure they&#039;re encrypted.&quot;

The vulnerability makes it possible for anyone with an Internet connection to determine whether any two parties are communicating over a long-lived transport control protocol connection, such as those that serve Web mail, news feeds, or direct messages. In the event the connections aren&#039;t encrypted, attackers can then inject malicious code or content into the traffic. Even when the connection is encrypted, the attacker may still be able to determine a channel exists and terminate it. The vulnerability is classified as CVE-2016-5696.

A Google representative said company engineers are are already aware of the vulnerability and are &quot;taking the appropriate actions. As noted in this post, the representative pointed out the flaw resides within vulnerable versions of the Linux kernel and it&#039;s not Android specific. The representative went on to say that the Android security team rates the risk &quot;moderate,&quot; as opposed to &quot;high&quot; or &quot;critical&quot; for many of the vulnerabilities it patches. Maintainers of the Linux kernel have already patched CVE-2016-5696. It wouldn&#039;t be surprising if that fix is incorporated into a new Android release in the next month or so.]]></description>
		<content:encoded><![CDATA[<p>Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks<br />
Off-path attack means malicious hackers can be located anywhere on the Internet.<br />
<a href="http://arstechnica.com/security/2016/08/linux-bug-leaves-1-4-billion-android-users-vulnerable-to-hijacking-attacks/" rel="nofollow">http://arstechnica.com/security/2016/08/linux-bug-leaves-1-4-billion-android-users-vulnerable-to-hijacking-attacks/</a></p>
<p>An estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren&#8217;t encrypted, inject malicious code or content into the parties&#8217; communications, researchers from mobile security firm Lookout said Monday.</p>
<p>As Ars reported last Wednesday, the flaw first appeared in version 3.6 of the Linux operating system kernel, which was introduced in 2012. In a blog post published Monday, Lookout researchers said that the Linux flaw appears to have been introduced into Android version 4.4 (aka KitKat) and remains present in all future versions, including the latest developer preview of Android Nougat. That tally is based on the Android install base as reported by statistics provider Statista, and it would mean that about 1.4 billion Android devices, or about 80 percent of users, are vulnerable.</p>
<p>&#8220;The tl;dr is for Android users to ensure they are encrypting their communications by using VPNs, [or] ensuring the sites they go to are encrypted,&#8221; Lookout researcher Andrew Blaich told Ars. &#8220;If there&#8217;s somewhere they&#8217;re going to that they don&#8217;t want tracked, always ensure they&#8217;re encrypted.&#8221;</p>
<p>The vulnerability makes it possible for anyone with an Internet connection to determine whether any two parties are communicating over a long-lived transport control protocol connection, such as those that serve Web mail, news feeds, or direct messages. In the event the connections aren&#8217;t encrypted, attackers can then inject malicious code or content into the traffic. Even when the connection is encrypted, the attacker may still be able to determine a channel exists and terminate it. The vulnerability is classified as CVE-2016-5696.</p>
<p>A Google representative said company engineers are are already aware of the vulnerability and are &#8220;taking the appropriate actions. As noted in this post, the representative pointed out the flaw resides within vulnerable versions of the Linux kernel and it&#8217;s not Android specific. The representative went on to say that the Android security team rates the risk &#8220;moderate,&#8221; as opposed to &#8220;high&#8221; or &#8220;critical&#8221; for many of the vulnerabilities it patches. Maintainers of the Linux kernel have already patched CVE-2016-5696. It wouldn&#8217;t be surprising if that fix is incorporated into a new Android release in the next month or so.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1505604</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 14 Aug 2016 16:28:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1505604</guid>
		<description><![CDATA[The weakness of TCP protocol implementation for Linux

vulnerability found in TCP protocol Linux implementation allows for the interception of TCP connections, data connections and disconnection for sneaking.

The vulnerability is based on the RFC5961: first presented at Challenge ACK -vastauspakettien as well as their responses to limit the transmission rate of the global rate limit implementations of the exploitation.

Vulnerable servers are Linux, with kernel version is 3.6 or later. Linux kernel 3.6 was published in 2012.

According to FICORA, the attack method can be utilized in practice only in long-term TCP connections. the case of encrypted connections vulnerability can only be used to cut the connections. Long-term non-encrypted connections are used, for example, automatically updating web pages such as news sites, IRC connections, downloads or video services.

Attack method can be utilized in practice only in long-term TCP connections. the case of encrypted connections vulnerability can only be used to cut the connections. Long-term non-encrypted connections are used, for example, automatically updating web pages such as news sites, IRC connections, downloads or video services.

So far, the vulnerability has not been offered compensation, but its use may be limited by changing the linux kernel parameter tcp_challenge_ack_limit. 

Sources:
http://www.tivi.fi/Kaikki_uutiset/linux-ytimesta-loytyi-vuosia-vanha-paha-haavoittuvuus-korjausta-ei-ole-olemassa-6573289
https://www.viestintavirasto.fi/kyberturvallisuus/haavoittuvuudet/2016/haavoittuvuus-2016-107.html]]></description>
		<content:encoded><![CDATA[<p>The weakness of TCP protocol implementation for Linux</p>
<p>vulnerability found in TCP protocol Linux implementation allows for the interception of TCP connections, data connections and disconnection for sneaking.</p>
<p>The vulnerability is based on the RFC5961: first presented at Challenge ACK -vastauspakettien as well as their responses to limit the transmission rate of the global rate limit implementations of the exploitation.</p>
<p>Vulnerable servers are Linux, with kernel version is 3.6 or later. Linux kernel 3.6 was published in 2012.</p>
<p>According to FICORA, the attack method can be utilized in practice only in long-term TCP connections. the case of encrypted connections vulnerability can only be used to cut the connections. Long-term non-encrypted connections are used, for example, automatically updating web pages such as news sites, IRC connections, downloads or video services.</p>
<p>Attack method can be utilized in practice only in long-term TCP connections. the case of encrypted connections vulnerability can only be used to cut the connections. Long-term non-encrypted connections are used, for example, automatically updating web pages such as news sites, IRC connections, downloads or video services.</p>
<p>So far, the vulnerability has not been offered compensation, but its use may be limited by changing the linux kernel parameter tcp_challenge_ack_limit. </p>
<p>Sources:<br />
<a href="http://www.tivi.fi/Kaikki_uutiset/linux-ytimesta-loytyi-vuosia-vanha-paha-haavoittuvuus-korjausta-ei-ole-olemassa-6573289" rel="nofollow">http://www.tivi.fi/Kaikki_uutiset/linux-ytimesta-loytyi-vuosia-vanha-paha-haavoittuvuus-korjausta-ei-ole-olemassa-6573289</a><br />
<a href="https://www.viestintavirasto.fi/kyberturvallisuus/haavoittuvuudet/2016/haavoittuvuus-2016-107.html" rel="nofollow">https://www.viestintavirasto.fi/kyberturvallisuus/haavoittuvuudet/2016/haavoittuvuus-2016-107.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1505098</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 11 Aug 2016 21:31:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1505098</guid>
		<description><![CDATA[https://www.quora.com/Why-is-Android-stuck-on-Linux-3-4
Why is Android stuck on Linux 3.4?
Since its inception, Android has followed the Linux kernel pretty closely. Sure it was always a few releases behind, but basically every version of Android got a new Linux kernel. However since JellyBean 4.2, Android has been stuck on Linux 3.4. Does anyone have an anwer for this?

I believe that Android Phone&#039;s kernel version largely depends on OEM&#039;s feature requirements and their ability to patch the mainline kernel to make it compatible with their device.]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.quora.com/Why-is-Android-stuck-on-Linux-3-4" rel="nofollow">https://www.quora.com/Why-is-Android-stuck-on-Linux-3-4</a><br />
Why is Android stuck on Linux 3.4?<br />
Since its inception, Android has followed the Linux kernel pretty closely. Sure it was always a few releases behind, but basically every version of Android got a new Linux kernel. However since JellyBean 4.2, Android has been stuck on Linux 3.4. Does anyone have an anwer for this?</p>
<p>I believe that Android Phone&#8217;s kernel version largely depends on OEM&#8217;s feature requirements and their ability to patch the mainline kernel to make it compatible with their device.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1505097</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 11 Aug 2016 21:30:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1505097</guid>
		<description><![CDATA[It seems that Android devices could be safe from this if the following is correct:

http://android.stackexchange.com/questions/51651/which-android-runs-which-linux-kernel

Table from Wikipedia:

Android Version    &#124;API Level  &#124;Linux Kernel in AOSP
----------------------------------------------------
1.5   Cupcake      &#124;3          &#124;2.6.27
1.6   Donut        &#124;4          &#124;2.6.29
2.0/1 Eclair       &#124;5-7        &#124;2.6.29
2.2.x Froyo        &#124;8          &#124;2.6.32
2.3.x Gingerbread  &#124;9, 10      &#124;2.6.35
3.x.x Honeycomb    &#124;11-13      &#124;2.6.36
4.0.x Ice Cream San&#124;14, 15     &#124;3.0.1
4.1.x Jelly Bean   &#124;16         &#124;3.0.31
4.2.x Jelly Bean   &#124;17         &#124;3.4.0
4.3   Jelly Bean   &#124;18         &#124;3.4.39
4.4   Kit Kat      &#124;19, 20     &#124;3.10
5.x   Lollipop     &#124;21, 22     &#124;3.16.1
6.0   Marshmallow  &#124;23         &#124;3.18.10

Note: other “distributions” of Android might run different kernel versions.


https://en.wikipedia.org/wiki/Android_version_history]]></description>
		<content:encoded><![CDATA[<p>It seems that Android devices could be safe from this if the following is correct:</p>
<p><a href="http://android.stackexchange.com/questions/51651/which-android-runs-which-linux-kernel" rel="nofollow">http://android.stackexchange.com/questions/51651/which-android-runs-which-linux-kernel</a></p>
<p>Table from Wikipedia:</p>
<p>Android Version    |API Level  |Linux Kernel in AOSP<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br />
1.5   Cupcake      |3          |2.6.27<br />
1.6   Donut        |4          |2.6.29<br />
2.0/1 Eclair       |5-7        |2.6.29<br />
2.2.x Froyo        |8          |2.6.32<br />
2.3.x Gingerbread  |9, 10      |2.6.35<br />
3.x.x Honeycomb    |11-13      |2.6.36<br />
4.0.x Ice Cream San|14, 15     |3.0.1<br />
4.1.x Jelly Bean   |16         |3.0.31<br />
4.2.x Jelly Bean   |17         |3.4.0<br />
4.3   Jelly Bean   |18         |3.4.39<br />
4.4   Kit Kat      |19, 20     |3.10<br />
5.x   Lollipop     |21, 22     |3.16.1<br />
6.0   Marshmallow  |23         |3.18.10</p>
<p>Note: other “distributions” of Android might run different kernel versions.</p>
<p><a href="https://en.wikipedia.org/wiki/Android_version_history" rel="nofollow">https://en.wikipedia.org/wiki/Android_version_history</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1505004</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 11 Aug 2016 13:09:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1505004</guid>
		<description><![CDATA[Pure Off-path TCP attack demo by using a side channel in Recent Linux Kernel 
https://www.youtube.com/watch?v=S4Ns5wla9DY

See more details in our paper &quot;Off-Path TCP Exploits: Global Rate Limit Considered Dangerous&quot;. This vulnerability is filed as CVE-2016-5696

http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf]]></description>
		<content:encoded><![CDATA[<p>Pure Off-path TCP attack demo by using a side channel in Recent Linux Kernel<br />
<a href="https://www.youtube.com/watch?v=S4Ns5wla9DY" rel="nofollow">https://www.youtube.com/watch?v=S4Ns5wla9DY</a></p>
<p>See more details in our paper &#8220;Off-Path TCP Exploits: Global Rate Limit Considered Dangerous&#8221;. This vulnerability is filed as CVE-2016-5696</p>
<p><a href="http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf" rel="nofollow">http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1505003</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 11 Aug 2016 13:08:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1505003</guid>
		<description><![CDATA[USA Today was hijacked by means of TCP bug

American scientists have demo the USENIX Security Conference in Austin, how linux kernel included in a TCP bug can be used to take over the popular website. The demo scientists show how an unencrypted USA Today magazine, the site will be hijacked.

The case of the University of California researchers. They found all Linux operating systems can be found in the vulnerability of the TCP protocol. 

The irony is that the opening associated with a relatively new Internet standard, RFC 5691. This is the Linux kernel implemented since 2012. 

Source: http://etn.fi/index.php?option=com_content&amp;view=article&amp;id=4818:usa-today-kaapattiin-tcp-bugin-avulla&amp;catid=13&amp;Itemid=101]]></description>
		<content:encoded><![CDATA[<p>USA Today was hijacked by means of TCP bug</p>
<p>American scientists have demo the USENIX Security Conference in Austin, how linux kernel included in a TCP bug can be used to take over the popular website. The demo scientists show how an unencrypted USA Today magazine, the site will be hijacked.</p>
<p>The case of the University of California researchers. They found all Linux operating systems can be found in the vulnerability of the TCP protocol. </p>
<p>The irony is that the opening associated with a relatively new Internet standard, RFC 5691. This is the Linux kernel implemented since 2012. </p>
<p>Source: <a href="http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4818:usa-today-kaapattiin-tcp-bugin-avulla&#038;catid=13&#038;Itemid=101" rel="nofollow">http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4818:usa-today-kaapattiin-tcp-bugin-avulla&#038;catid=13&#038;Itemid=101</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/11/linux-tcp-bug-leaves-sites-vulnerable-to-serious-hijacking-attacks/comment-page-1/#comment-1504951</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 11 Aug 2016 06:38:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45214#comment-1504951</guid>
		<description><![CDATA[Research paper can be found at http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf]]></description>
		<content:encoded><![CDATA[<p>Research paper can be found at <a href="http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf" rel="nofollow">http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
