Submitted via IRC for TheMightyBuzzard
Microsoft released a security advisory about a denial-of-service vulnerability that could render multiple versions of Windows completely unresponsive and has no mitigation factors, the company says.
The vulnerability affects all versions of Windows 7 through 10 (including 8.1 RT), Server 2008, 2012, 2016, and Core Installations that don't have the latest set of security updates released as part of the September 2018 Patch Tuesday updates.
Tagged with the identification number CVE-2018-5391, the bug received the moniker FragmentSmack because it responds to IP fragmentation, a process that adjusts the packet size to fit the maximum transmission unit (MTU) at the receiving end.
IP fragmentation attacks are a known form of denial of service, where the victim computer receives multiple IP packets of a smaller size that are expected to be reassembled into their original form at the destination.
FragmentSmack is a TCP fragmentation type of attack, also known as a Teardrop attack, that prevents reassembling the packets on the recipient end. The vulnerability is as old as Windows 3.1 and 95, where it crashed the OS, but it was seen in the more recent Windows 7, too.
Why write all new bugs when you can just reboot old ones?
(Score: 2) by Runaway1956 on Wednesday September 19 2018, @09:55AM (2 children)
All systems are vulnerable, and we need to be reminded of that fact from time to time. But, "Windows Systems Vulnerable" gets redundant.
Abortion is the number one killed of children in the United States.
(Score: 4, Informative) by ledow on Wednesday September 19 2018, @10:03AM
Indeed
https://access.redhat.com/articles/3553061 [redhat.com]
It does get me that we still don't do calculations on whether basic features can be used to amplify the impact of such an attack out of a reasonable range, or design protocols so that they don't result in "more data / calculation" than a fixed bound in the first place.
(Score: 2) by DannyB on Wednesday September 19 2018, @05:46PM
Lots of things, even ordinary nominal usage can render Windows systems completely unresponsive and have no mitigation factors*.
* other than upgrading to a REAL operating system
If you eat an entire cake without cutting it, you technically only had one piece.