{"vulnerability": "CVE-2019-11477", "sightings": [{"uuid": "5448942c-5327-409b-b6e6-4d88bb51ec13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/516", "content": "\u041e\u0433\u043e\u0433\u043e, \u043f\u043e\u043a\u0430 \u043c\u044b \u0442\u0443\u0442 \u0437\u0430\u043d\u044f\u0442\u044b OFFZONE, \u0414\u0436\u043e\u043d\u0430\u0442\u0430\u043d \u041b\u0443\u043d\u0438 \u0438\u0437 Neftlix \u043d\u0430\u0448\u0435\u043b \u0446\u0435\u043b\u0443\u044e \u043f\u0430\u0447\u043a\u0443 TCP \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u044f\u0434\u0440\u0430\u0445 FreeBSD \u0438 Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0445 \u0432\u044b\u0437\u044b\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438. \u0412\u0441\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u043e\u0439 \u0438\u043b\u0438 \u0438\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0437\u0430\u0432\u044f\u0437\u0430\u043d\u044b \u043d\u0430 minimum segment size (MSS) \u0438 TCP Selective Acknowledgement (SACK) \u0438 \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0432\u044b\u0437\u0432\u0430\u0442\u044c kernel panic \u043d\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u044f\u0434\u0440\u0430\u0445 Linux.\n\n\u0412 \u043e\u0431\u0449\u0435\u043c \u043d\u0435\u043a\u043e\u0433\u0434\u0430 \u043e\u0431\u044a\u044f\u0441\u043d\u044f\u0442\u044c, \u0431\u0435\u0433\u043e\u043c \u043f\u0430\u0442\u0447\u0438\u0442\u044c\u0441\u044f!\n\nCVE-2019-11477, CVE-2019-11478, CVE-2019-5599 \u0438 CVE-2019-11479.\n\nhttps://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md\n\nhttps://access.redhat.com/security/vulnerabilities/tcpsack", "creation_timestamp": "2019-06-18T10:33:04.000000Z"}, {"uuid": "d00dc0e8-a364-4436-b96a-1ad628bdc9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "published-proof-of-concept", "source": "https://t.me/w2hack/248", "content": "\u0421\u0430\u043c\u044b\u0435 \u0433\u043e\u0440\u044f\u0447\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u0435\u0441\u044f\u0446\u0430:\n\n\u0411\u0430\u0433\u0438 \u0432 TCP\\IP \u0441\u0442\u0435\u043a\u0435 \u043f\u0438\u043d\u0433\u0432\u0438\u043d\u0430 Linux \u0438 \u0441\u0447\u0438\u0442\u0430\u0432\u0448\u0435\u0439\u0441\u044f  \u0336\u043e\u0336\u0445\u0336\u0443\u0336\u0435\u0336\u043d\u0336\u043d\u0336\u043e\u0336  \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 FreeBSD, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0435 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 Denial of Service \u0441\u0438\u0441\u0442\u0435\u043c\u044b (CVE-2019-11477 \u0438 CVE-2019-11478 \u0438 CVE-2019-5599 \u0438 CVE-2019-11479)\nhttp://www.opennet.ru/opennews/art.shtml?num=50889\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 0-day \u0434\u043b\u044f Windows 10 \u0433\u043e\u0442\u043e\u0432\u044b\u0435 \u043a  \u0336\u043d\u0336\u0435\u0336\u0432\u0336\u044a\u0336\u0435\u0336\u0431\u0336\u0435\u0336\u043d\u0336\u043d\u0336\u043e\u0336\u0439\u0336 \u0336 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 (\u043a\u043e\u043d\u0446\u0435\u043f\u0442 \u0430\u0442\u0430\u043a\u0438 \u0438 \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u0438 \u043d\u0430 GitHub, \u043f\u043e\u043a\u0430 \u0435\u0449\u0435 \u043d\u0435 \u043f\u0440\u0438\u043a\u0440\u044b\u043b\u0438)\n[GitHub] https://github.com/SandboxEscaper/polarbearrepo\n[News] https://xakep.ru/2019/05/24/second-exploits-batch/\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0431\u0437\u043e\u0440 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (CVE-2019-0697, CVE-2019-0698, CVE-2019-0726) \u0432 \u043a\u043b\u0438\u0435\u043d\u0442\u0435 Windows DHCP\nhttps://www.securitylab.ru/blog/company/pt/346144.php", "creation_timestamp": "2019-06-21T23:17:22.000000Z"}, {"uuid": "daa35a43-27df-4f85-8647-1ac355b50faa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "published-proof-of-concept", "source": "https://t.me/antichat/5471", "content": "\u041e\u0433\u043e\u0433\u043e, \u043f\u043e\u043a\u0430 \u043c\u044b \u0442\u0443\u0442 \u0437\u0430\u043d\u044f\u0442\u044b OFFZONE, \u0414\u0436\u043e\u043d\u0430\u0442\u0430\u043d \u041b\u0443\u043d\u0438 \u0438\u0437 Neftlix \u043d\u0430\u0448\u0435\u043b \u0446\u0435\u043b\u0443\u044e \u043f\u0430\u0447\u043a\u0443 TCP \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u044f\u0434\u0440\u0430\u0445 FreeBSD \u0438 Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0445 \u0432\u044b\u0437\u044b\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438. \u0412\u0441\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u043e\u0439 \u0438\u043b\u0438 \u0438\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0437\u0430\u0432\u044f\u0437\u0430\u043d\u044b \u043d\u0430 minimum segment size (MSS) \u0438 TCP Selective Acknowledgement (SACK) \u0438 \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0432\u044b\u0437\u0432\u0430\u0442\u044c kernel panic \u043d\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u044f\u0434\u0440\u0430\u0445 Linux.\n\n\u0412 \u043e\u0431\u0449\u0435\u043c \u043d\u0435\u043a\u043e\u0433\u0434\u0430 \u043e\u0431\u044a\u044f\u0441\u043d\u044f\u0442\u044c, \u0431\u0435\u0433\u043e\u043c \u043f\u0430\u0442\u0447\u0438\u0442\u044c\u0441\u044f!\n\nCVE-2019-11477, CVE-2019-11478, CVE-2019-5599 \u0438 CVE-2019-11479.\n\nhttps://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md\n\nhttps://access.redhat.com/security/vulnerabilities/tcpsack", "creation_timestamp": "2019-06-18T16:30:54.000000Z"}, {"uuid": "28596db0-b59e-4951-9017-1a87a8ca4671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "seen", "source": "https://t.me/tech_b0lt_Genona/610", "content": "Three related flaws were found in the Linux kernel\u2019s handling of TCP networking.  The most severe vulnerability could allow a remote attacker to trigger a kernel panic in systems running the affected software and, as a result, impact the system\u2019s availability.\n\nTCP SACK PANIC - Kernel vulnerabilities - CVE-2019-11477, CVE-2019-11478 &amp; CVE-2019-11479\nhttps://access.redhat.com/security/vulnerabilities/tcpsack", "creation_timestamp": "2019-06-17T19:43:32.000000Z"}, {"uuid": "5c22bd41-a3ec-40ff-af16-151638f46a3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "published-proof-of-concept", "source": "Telegram/h5EwYtuwwXPdDCKddKMW_zd4EURsKYrc4pFXCG7tts0i5Js", "content": "", "creation_timestamp": "2019-07-01T19:18:44.000000Z"}, {"uuid": "9f32c883-f4f0-41eb-9943-3ae1688e4f11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "seen", "source": "https://t.me/canyoupwnme/5650", "content": "TCP SACK PANIC - Kernel vulnerabilities - CVE-2019-11477, CVE-2019-11478 &amp; CVE-2019-11479\nhttps://access.redhat.com/security/vulnerabilities/tcpsack", "creation_timestamp": "2019-06-18T01:21:57.000000Z"}, {"uuid": "35250cd7-cc17-485f-a778-bfbd2789df0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "seen", "source": "Telegram/xADcJHvbl80L1aSpPUDb8qsDyOlCjAaYyJv5UKHSmc4u5lc", "content": "", "creation_timestamp": "2019-07-01T07:17:01.000000Z"}, {"uuid": "56cc091c-e6d9-4da4-b9b3-53322417feba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "seen", "source": "Telegram/RYuO9rnZyZatuBLmi4stN6fr4cvIa3LCbuSc0quitWP1aoWi", "content": "", "creation_timestamp": "2020-06-01T02:07:41.000000Z"}, {"uuid": "997968b6-28a6-4c61-9e83-c247218beaba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11477", "type": "seen", "source": "https://t.me/itsecalert/123", "content": "\u26a0\ufe0f Linux/FreeBSD Denial of Service attacks possible. Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels.\n\n- CVE-2019-11477: SACK Panic (Linux &gt;= 2.6.29)\n- 3 more CVEs\n\nSeverity: \ud83d\udd36 High\nMore Information: https://yt.gl/sackpanic\n\n#alert #severityhigh #vulnerability #linux #freebsd #networking #kernel\n\n\ud83d\udcec Spread the news, forward the message to your sysadmins.\n\u2753 Questions? Feedback? Want to discuss? Join us at @itsectalk", "creation_timestamp": "2019-06-19T13:50:17.000000Z"}]}