Synology-SA-18:44 Linux kernel

Publish Time: 2018-08-15 13:17:16 UTC+8

Last Updated: 2021-04-14 08:43:39 UTC+8

Severity
Important
Status
Resolved

Abstract

CVE-2018-5391, a.k.a. FragmentSmack attack, allows remote attackers to conduct denial-of-service attacks via a susceptible version of Synology Diskstation Manager (DSM), SkyNAS or VS960HD.

SRM 1.1 is not affected as CVE-2018-5391 only affects Linux kernel 3.9 or above.

Affected Products

Product Severity Fixed Release Availability
DSM 6.2 Important Upgrade to 6.2.1-23824-1 or above.
DSM 6.1 Important Upgrade to 6.2.1-23824-1 or above.
DSM 5.2 Important Upgrade to 6.2.1-23824-1 or above.
SkyNAS Important Will not fix.
VS960HD Important Will not fix.
SRM 1.1 Not affected N/A

Mitigation

If you need immediate assistance, please contact Synology technical support via https://account.synology.com/en-global/support.

Detail

  • CVE-2018-5391
    • Severity: Important
    • CVSS3 Base Score: 7.5
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    • The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

Reference

Revision

Revision Date Description
1 2018-08-15 Initial public release.
2 2019-12-17 Update for DSM 6.2, DSM 6.1 and DSM 5.2 are now available in Affected Products.
3 2021-04-14 Disclosed vulnerability details.