High severity7.5NVD Advisory· Published Feb 14, 2017· Updated May 13, 2026
CVE-2017-5972
CVE-2017-5972
Description
The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- cxsecurity.com/issue/WLB-2017020112nvdExploitThird Party Advisory
- packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.htmlnvdExploitThird Party AdvisoryVDB Entry
- seclists.org/oss-sec/2017/q1/573nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/96231nvdThird Party AdvisoryVDB Entry
- access.redhat.com/security/cve/cve-2017-5972nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- githubengineering.com/syn-flood-mitigation-with-synsanity/nvdThird Party Advisory
- security-tracker.debian.org/tracker/CVE-2017-5972nvdThird Party Advisory
- www.exploit-db.com/exploits/41350/nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.