Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (UNIX)  >   Solaris Vendors:   Sun
Solaris TCP SYN Attack Protection Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1019989
SecurityTracker URL:
CVE Reference:   CVE-2008-2121   (Links to External Site)
Updated:  May 13 2008
Original Entry Date:  May 8 2008
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8, 9, 10
Description:   A vulnerability was reported in Solaris. A remote user can cause denial of service conditions in certain situations.

When a target system is undergoing a TCP SYN flood attack, a remote user can cause the target system to be slow to accept new network connections, causing the network connections to time out before establishing a connection. On uniprocessor systems, the remote user can cause excessive CPU usage.

Systems that are configured with a 'tcp_conn_req_max_q0' value that is signficantly higher than the default value of 1024 are affected.

Impact:   A remote user can cause denial of service conditions.
Solution:   The vendor has issued a fix.

SPARC Platform

* Solaris 8 with patch116965-33 or later
* Solaris 9 with patch 114344-35 or later
* Solaris 10 with patch 119998-01 or later

x86 Platform

* Solaris 8 with patch 116966-32 or later
* Solaris 9 with patch 119435-23 or later
* Solaris 10 with patch 119999-01 or later

Note: There are additional Solaris 8 and 9 patches which list 6402737 in their README, however these patches are not required to address the issue described in this Sun Alert. These additional patches deliver an updated kernel debugger (kadb(1M)). The patch-IDs are:

SPARC Platform

* Solaris 8 patch 117350-54 or later
* Solaris 9 patch 122300-25 or later

x86 Platform

* Solaris 8 patch 117351-54 or later
* Solaris 9 patch 122301-25 or later

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC