### [CVE-2018-5391](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391) ![](https://img.shields.io/static/v1?label=Product&message=Kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.93.9%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400&color=brighgreen) ### Description The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/chetanshirke/my_ref - https://github.com/ozipoetra/natvps-dns