• 公告ID (KylinSec-SA-2024-3257)

摘要:

The TCP protocol in RFC 9293 has a timing side channel that makes it easier for remote attackers to infer the content of one TCP connection from a client system (to any server), when that client system is concurrently obtaining TCP data at a slow rate from an attacker-controlled server, aka the "SnailLoad" issue. For example, the attack can begin by measuring RTTs via the TCP segments whose role is to provide an ACK control bit and an Acknowledgment Number.

安全等级: Low

公告ID: KylinSec-SA-2024-3257

发布日期: 2024年8月1日

关联CVE: CVE-2024-39920  

  • 详细介绍

1. 漏洞描述

   

The TCP protocol in RFC 9293 has a timing side channel that makes it easier for remote attackers to infer the content of one TCP connection from a client system (to any server), when that client system is concurrently obtaining TCP data at a slow rate from an attacker-controlled server, aka the "SnailLoad" issue. For example, the attack can begin by measuring RTTs via the TCP segments whose role is to provide an ACK control bit and an Acknowledgment Number.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-39920 KY3.4-5A kernel Unaffected
CVE-2024-39920 KY3.5.2 kernel Unaffected
CVE-2024-39920 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3256 下一篇:KylinSec-SA-2024-3258