The latest security information on Intel® products.

Intel® Ethernet 82598 and 82599 10 Gigabit Ethernet Controller Denial of Service.

Intel ID INTEL-SA-00028
Product family Intel® Ethernet 10 Gigabit Ethernet
Impact of vulnerability Denial of Service
Severity rating Important
Original release May 18, 2011
Last revised May 18, 2011

Summary: 

Intel is releasing a driver update to mitigate a denial of service issue with the Intel® 10 Gigabit Ethernet 82598 and 82599 Controllers.

Description: 

Under certain circumstances a denial of service issue is present in the Intel® 10 Gigabit Ethernet 82598 and 82599 Controllers. A knowledgeable remote malicious attacker could leverage this issue to deny service to legitimate users. This issue was reported by a business partner. Intel is releasing a driver update to mitigate this issue.

 

Affected products: 

This advisory affects platforms that use the Intel® 82598 and 82599 Ethernet controllers, as per table below:

Part Number

Silicon Product

Adapter Products

82598EB

Intel® 82598 10 Gigabit Ethernet Controller

E10G42AFDA (Dual SFP+ Copper)
E10G41AT2 (Single RJ45 Copper)
EXPX9502CX4 (Dual CX4 Copper)
EXPX9501AFXSR (Single SR Fiber)
EXPX9502AFXSR (Dual SR Fiber)
EXPX9501AFXLR (Single LR Fiber)

82599EB
82599ES

Intel® 82599 10 Gigabit Ethernet Controller

X520-DA2 (Dual SFP+ Copper)
X520-T2 (Single RJ45 Copper)
X520-SR1 (Single SR Fiber)
X520-SR2 (Dual SR Fiber)
X520-LR1 (Single LR Fiber)

Recommendations: 

While Intel is not aware of any reports of this issue being exploited externally, Intel has made changes to the Intel® Ethernet 10 Gigabit Ethernet driver to mitigate this issue. It is highly recommended to apply these updates to affected products. Intel has also made available updated drivers corresponding to the affected Operating Systems as per the table below. The user can locate the drivers for your operating system at following URL:

Ethernet Drivers

Operating System

Exposed to issue?

Updated Driver Version
(Earlier versions have exposure)

Updated Driver
Availability

 

IA32

X64

IPF

   

Windows CE

N/A

N/A

N/A

N/A – Not supported OS

N/A

 

Windows PE

N/A

N/A

N/A

N/A – Not supported OS

N/A

 

Windows Vista

N

N

N/A

N/A – Feature not supported in OS

N/A

 

Windows XP Professional

N/A

N/A

N/A

N/A - Not Supported OS

N/A

Windows XP Professional x64

N/A

N/A

N/A

N/A - Not Supported OS

N/A

Windows XP Embedded

N/A

N/A

N/A

N/A – Not supported OS

N/A

Windows 7

N

N

N/A

N/A – Feature not supported in OS

N/A

 

Windows Server 2003

N

N

N

N/A – Feature not supported in OS

N/A

 

Windows Server 2008

Y

Y

Y

82598: IXE 2.4.29.1 (1/7/2011[1])
82599: IXN 2.7.28.0 (1/14/2011) + point-fix in IXN 2.5.52.1 (3/28/2011)

Now
Intel release 16.0

Windows Server 2008 Core

Y

Y

N/A

82598: IXE 2.4.29.1 (1/7/2011*)

82599: IXN 2.7.28.0 (1/14/2011) + point-fix in IXN 2.5.52.1 (3/28/2011)

Now
Intel release 16.0

Windows Server 2008  (w/ Hyper-V)

N/A

Y

N/A

82598: IXE 2.4.29.1 (1/7/2011*)

82599: IXN 2.7.28.0 (1/14/2011) + point-fix in IXN 2.5.52.1 (3/28/2011)     

Now
Intel release 16.0

Hyper-V Server 2008 (stand-alone)

N/A

Y

N/A

82598: IXE 2.4.29.1 (1/7/2011*)

82599: IXN 2.7.28.0 (1/14/2011) + point-fix IXN 2.5.52.1 (3/28/2011) 

Now
Intel release 16.0

Windows Server 2008 R2

N/A

Y

Y

82598: IXE 2.4.29.1 (1/7/2011*)

82599: IXN 2.7.28.0 (1/14/2011) + point-fix IXN 2.5.52.1 (3/28/2011)      

Now
Intel release 16.0

Windows Server 2008 R2 Core

N/A

Y

N/A

82598: IXE 2.4.29.1 (1/7/2011*)

82599: IXN 2.7.28.0 (1/14/2011) + point-fix in IXN 2.5.52.1 (3/28/2011)

Now
Intel release 16.0

Windows Server 2008 R2 (w/ Hyper-V)

N/A

Y

N/A

82598: IXE 2.4.29.1 (1/7/2011*)

82599: IXN 2.7.28.0 (1/14/2011) + point-fix in IXN 2.5.52.1 (3/28/2011)      

Now
Intel release 16.0

Hyper-V Server 2008 R2 (stand-alone)

N/A

Y

N/A

82598: IXE 2.4.29.1 (1/7/2011*)

82599: IXN 2.7.28.0 (1/14/20111) + point-fix in IXN 2.5.52.1 (3/28/2011)      

Now
Intel release 16.0

Intel has also made available updated drivers corresponding to the affected non-Windows based Operating Systems as per the table below.

Operating System

Exposed to issue?

Updated Driver Version
(Earlier versions have exposure)

Updated Driver
Availability

 

IA32

X64

IPF

   

VMware ESX 4.1

N/A

N

N/A

N/A – Feature not supported in OS

N/A

VMware ESX 4.0

N/A

N

N/A

N/A – Feature not supported in OS

N/A

 

Linux Source Forge

Y

Y

Y

Ixgbe 3.2.9

Now – Intel, SourceForge

Upstream 2.6 Kernel

Y

Y

Y

2.6.38 Kernel

Now - Kernel.org

Linux RHEL 5.6

Y

Y

Y

ixgbe 3.2.9

Now – via Red Hat updates

Linux RHEL 6.0

Y

Y

N/A

ixgbe 3.2.9

Now – via Red Hat updates

Linux SLES 10 SP4

Y

Y

N/A

ixgbe 3.2.9

Now – via Novell updates

Linux SLES 11 SP1

Y

Y

Y

ixgbe 3.2.9

Now -

via Novell updates

Citrix Xenserver

N/A

Y

N/A

ixgbe 3.2.9

Contact Citrix for availability

Solaris

N

N

N

N/A – Feature not supported in OS

N/A

 

FreeBSD 7.1

FreeBSD 8

Y

Y

N/A

ixgbe 2.3.8

Now

freebsd.org

DOS NDIS 2

N/A

N/A

N/A

N/A – Not supported OS

N/A

 

DOS ODI

N/A

N/A

N/A

N/A – Not supported OS

N/A

 

EFI 1.1

N

N/A

N

N/A – Feature not supported in OS

N/A

 

UEFI 2.1

N

N

N

N/A – Feature not supported in OS

N/A

Detailed installation instructions can be found in the driver download readme and release notes.

 

[1] Updated by INF – date shows driver version from INF

Users of OEM systems contact your system manufacturer for the latest updates.

Revision history:

Revision

Date

Description

1.0

18-May-2011

Initial Release

Legal Notices and Disclaimers

Intel provides these materials as-is, with no express or implied warranties.

All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.

Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.

Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://intel.com.

Some results have been estimated or simulated using internal Intel analysis or architecture simulation or modeling, and provided to you for informational purposes. Any differences in your system hardware, software or configuration may affect your actual performance.

Intel and the Intel logo are trademarks of Intel Corporation in the United States and other countries.

*Other names and brands may be claimed as the property of others.
Copyright © Intel Corporation 2018

Report a Vulnerability

If you have information about a security issue or vulnerability with an Intel branded product or technology, please send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key.

Please provide as much information as possible, including:

  • The products and versions affected
  • Detailed description of the vulnerability
  • Information on known exploits

A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:

For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.

For issues related to Intel managed open source projects, please visit http://www.01.org/security

Need product support?

The secure@intel.com e-mail address should only be used for reporting security issues.

If you...

  • Have questions about the security features of an Intel product
  • Require technical support
  • Want product updates or patches


Please visit Support & Downloads.