Upstream information

CVE-2008-4609 at MITRE


The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.1
Vector AV:N/AC:M/Au:N/C:N/I:N/A:C
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Note from the SUSE Security Team

The upstream Linux kernel community does not consider this to be an issue in the kernel. We are not planning to do a code fix for this problem. A full advisory has been posted (linked above).

SUSE Bugzilla entries: 432589 [RESOLVED / INVALID], 519126 [RESOLVED / UPSTREAM]

SUSE Security Advisories:

SUSE Timeline for this CVE

CVE page created: Tue Jul 9 18:30:38 2013
CVE page last modified: Fri Oct 7 12:45:43 2022