Submitted via IRC for TheMightyBuzzard
Microsoft released a security advisory about a denial-of-service vulnerability that could render multiple versions of Windows completely unresponsive and has no mitigation factors, the company says.
The vulnerability affects all versions of Windows 7 through 10 (including 8.1 RT), Server 2008, 2012, 2016, and Core Installations that don't have the latest set of security updates released as part of the September 2018 Patch Tuesday updates.
Tagged with the identification number CVE-2018-5391, the bug received the moniker FragmentSmack because it responds to IP fragmentation, a process that adjusts the packet size to fit the maximum transmission unit (MTU) at the receiving end.
IP fragmentation attacks are a known form of denial of service, where the victim computer receives multiple IP packets of a smaller size that are expected to be reassembled into their original form at the destination.
FragmentSmack is a TCP fragmentation type of attack, also known as a Teardrop attack, that prevents reassembling the packets on the recipient end. The vulnerability is as old as Windows 3.1 and 95, where it crashed the OS, but it was seen in the more recent Windows 7, too.
Why write all new bugs when you can just reboot old ones?
(Score: 3, Insightful) by DannyB on Wednesday September 19 2018, @05:51PM
All old vulnerabilities are new again. Or at least re-invented.
If old vulnerabilities didn't come back to life again, then why would you keep on paying and paying for ever ongoing security updates? Especially when you must pay the company that created the problems in the first place.
Sure I can fix all the defects in this new car you bought, if you pay me to fix ongoing problems that you will discover over time.
To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.