CVE-2019-11479
CVSS v3.1
7.5 (High)
CVSS v2.0
5 (Medium)
EPSS
97.42 % (100th)
Affected Products
22
Advisories
61
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
Weaknesses
- CVE Status
- PUBLISHED
- CNA
- Canonical Ltd.
- Published Date
-
2019-06-19 00:15:12
(5 years ago) - Updated Date
-
2023-11-07 03:03:02
(10 months ago)
Affected Products
- Big-ip Access Policy Manager
- Big-ip Advanced Firewall Manager
- Big-ip Analytics
- Big-ip Application Acceleration Manager
- Big-ip Application Security Manager
- Big-ip Domain Name System
- Big-ip Edge Gateway
- Big-ip Fraud Protection Service
- Big-ip Global Traffic Manager
- Big-ip Link Controller
- Big-ip Local Traffic Manager
- Big-ip Policy Enforcement Manager
- Big-ip Webaccelerator
- Big-iq Centralized Management
- Enterprise Manager
- Iworkflow
- Traffix Signaling Delivery Controller
Loading...
Loading...
Loading...
Configuration #1
|
Configuration #2
|
Configuration #3
|
Configuration #4
|
Configuration #5
|
Configuration #6
|
Configuration #7
|
Configuration #8
|
Configuration #9
|
Configuration #10
|
Configuration #11
|
Configuration #12
|
Configuration #13
|
Configuration #14
|
Configuration #15
|
Configuration #16
|
Configuration #17
|
Configuration #18
AND |
|
---|
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...