News
News
4/20/2004
06:16 PM
Connect Directly
RSS
E-Mail
50%
50%

Security Vulnerability Threatens Internet

A new set of security flaws involving the Transmission Control Protocol could open corporate networks and the Internet to attacks.

A serious new security vulnerability that could affect large parts of the Internet as well as corporate networks has been identified by the Department of Homeland Security's National Cybersecurity Division and the U.K.-based National Infrastructure Security Coordination Centre.

The flaw involves the ubiquitous Transmission Control Protocol used for Internet traffic, the two groups warned Tuesday.

Hackers could use the "TCP injection vulnerability" in conjunction with a vulnerability in the Border Gateway Protocol, a widely used routing protocol, to launch denial-of-service attacks that would affect "a large segment of the Internet community," according to the Homeland Security advisory.

Also, because of a "TCP/IP Initial Sequence Number vulnerability," Web sites and Internet services that rely on constant TCP sessions could be attacked and suffer from data corruption, session hijacking, or denial-of-service attacks.

Networking products from Check Point, Cisco Systems, Cray, and Juniper Networks are among those vulnerable because of the flaws, according to the National Infrastructure Security Coordination Centre. More details are available here.

Businesses using equipment from those vendors, some of which have not yet issued patches, should implement IP Security to encrypt network traffic so TCP information won't be available to attackers, reduce the TCP window size, and not publish their source TCP port information, the U.K. security center advises.

To mitigate the BGP flaw, the security center advises companies to filter both incoming and outgoing network traffic to ensure that it has a proper source IP address for the router or firewall receiving the traffic, and to implement the TCP MD5 Signature Option to check the validity of the TCP packet carrying BGP application data. Companies also should limit the amount of information outsiders can gather through domain name system resource records.

Internet Security Systems X-Force, a security resource group, says network infrastructure providers and business networks are the most vulnerable to denial-of-service attacks.

Comment  | 
Print  | 
More Insights
IT's Reputation: What the Data Says
IT's Reputation: What the Data Says
InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Must Reads Oct. 21, 2014
InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A roundup of the top stories and trends on InformationWeek.com
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.