{"id":4157,"date":"2016-08-17T15:52:45","date_gmt":"2016-08-17T13:52:45","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=4157"},"modified":"2024-06-04T17:00:29","modified_gmt":"2024-06-04T15:00:29","slug":"vulnerabilite-de-tcp-sous-gnu-linux","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/","title":{"rendered":"Mailfence n&rsquo;est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">R\u00e9cemment , une vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux a \u00e9t\u00e9 divulgu\u00e9e ( <\/span><a href=\"https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2016-5696\"><span style=\"font-weight: 400;\">CVE-2016-5696<\/span><\/a><span style=\"font-weight: 400;\"> ) par <\/span><a href=\"http:\/\/www.theregister.co.uk\/2016\/08\/10\/linux_tor_users_open_corrupted_communications\/\"><span style=\"font-weight: 400;\">une \u00e9quipe de chercheurs en s\u00e9curit\u00e9 aux \u00c9tats -Unis<\/span><\/a><span style=\"font-weight: 400;\">. Apr\u00e8s analyse, ce bug ne constituait pas une menace pour nos utilisateurs. N\u00e9anmoins, nous avons pris imm\u00e9diatement apr\u00e8s des mesures suppl\u00e9mentaires pour renforcer les serveurs de Mailfence.<\/span><\/p>\n\n\n\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-300x300.jpg\" alt=\"vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux\" class=\"wp-image-1275\" style=\"width:200px\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-300x300.jpg 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-150x150.jpg 150w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-768x768.jpg 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon.jpg 1024w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-160x160.jpg 160w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-320x320.jpg 320w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-245x245.jpg 245w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-340x340.jpg 340w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-450x450.jpg 450w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/shield-ok-icon-500x500.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-nbsp\">&nbsp;<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-vulnerabilite-de-tcp-sous-gnu-linux\">Vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux<\/h3>\n\n\n\n<p>La vuln\u00e9rabilit\u00e9 qui a \u00e9t\u00e9 d\u00e9couverte est pr\u00e9sente dans le noyau GNU\/Linux depuis 2012. Elle oblige l\u2019attaquant \u00e0 se procurer \u00e0 la fois les adresses IP du client et du serveur. En raison d&rsquo;une \u00ab\u00a0<em>rate limit<\/em>\u00a0\u00bb impos\u00e9e par le noyau GNU\/Linux sur les paquets TCP via Challenge ACK, il est possible de pirater la connexion TCP entre le client et le serveur. Cela peut (par exemple) permettre \u00e0 un attaquant d&rsquo;injecter du code\/des donn\u00e9es malveillant(es) dans le flux de communication (web) HTTP.<\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Cette vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e sans que les conditions requises pour une <\/span><a href=\"https:\/\/blog.mailfence.com\/fr\/modele-mailfence-menaces\/\"><span style=\"font-weight: 400;\">attaque de l\u2019homme du milieu<\/span><\/a><span style=\"font-weight: 400;\"> (<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Attaque_de_l%27homme_du_milieu\">MiTM<\/a>) soient remplies. Ainsi, l&rsquo;attaque peut \u00e9galement \u00eatre effectu\u00e9e \u00ab\u00a0<em>off path<\/em>\u00a0\u00bb sans n\u00e9cessiter d&rsquo;intercepter les transmissions du r\u00e9seau entre le client et le serveur. Cela r\u00e9duit consid\u00e9rablement la difficult\u00e9 de l&rsquo;attaque. Vous trouverez des d\u00e9tails suppl\u00e9me<\/span><span style=\"font-weight: 400;\">ntaires dans <\/span><a href=\"http:\/\/www.cs.ucr.edu\/~zhiyunq\/pub\/sec16_TCP_pure_offpath.pdf\"><span style=\"font-weight: 400;\">ce rapport de recherche<\/span><\/a><span style=\"font-weight: 400;\"> d\u2019origine (lien en anglais).<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-la-protection-de-nos-utilisateurs\">La protection de nos utilisateurs<\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Bien que cette vuln\u00e9rabilit\u00e9 puisse sembler grave, son impact est limit\u00e9 dans la pratique pour les utilisateurs connect\u00e9s \u00e0 nos serveurs. Au pire, les connexions TCP arbitraires pourraient th\u00e9oriquement \u00eatre ferm\u00e9es et aucun piratage ne pourrait se produire, en raison de l\u2019emploi du chiffrement&nbsp;<\/span><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Transport_Layer_Security\"><span style=\"font-weight: 400;\">TLS<\/span><\/a><span style=\"font-weight: 400;\">. Pour les sessions Web en particulier, notre politique <\/span><a href=\"https:\/\/fr.wikipedia.org\/wiki\/HTTP_Strict_Transport_Security\"><span style=\"font-weight: 400;\">HSTS <\/span><\/a><span style=\"font-weight: 400;\">garantit l\u2019emploi de HTTPS ( et non HTTP) d\u00e8s le d\u00e9part. <\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">De plus, afin de mieux prot\u00e9ger nos utilisateurs contre la possibilit\u00e9 d\u2019une attaque de type d\u00e9ni de service (<\/span><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Attaque_par_d%C3%A9ni_de_service\"><span style=\"font-weight: 400;\">DoS<\/span><\/a><span style=\"font-weight: 400;\">), notre \u00e9quipe de s\u00e9curit\u00e9 a pris les mesures n\u00e9cessaires, sans attendre que les nouveaux paquets du noyau soient diffus\u00e9s.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-faites-passer-le-message\">Faites passer le message !<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>R\u00e9cemment , une vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux a \u00e9t\u00e9 divulgu\u00e9e ( CVE-2016-5696 ) par une \u00e9quipe de chercheurs en s\u00e9curit\u00e9 aux \u00c9tats -Unis. Apr\u00e8s analyse, ce bug ne constituait pas une menace pour nos utilisateurs. N\u00e9anmoins, nous avons pris imm\u00e9diatement apr\u00e8s des mesures suppl\u00e9mentaires pour renforcer les serveurs de Mailfence. &nbsp; Vuln\u00e9rabilit\u00e9 de TCP [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85931,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":["post-4157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence | Blog<\/title>\n<meta name=\"description\" content=\"R\u00e9cemment, une vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux a \u00e9t\u00e9 divulgu\u00e9e par une \u00e9quipe de chercheurs en s\u00e9curit\u00e9 aux \u00c9tats -Unis. Mais elle ne constituait pas une menace pour nos utilisateurs.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mailfence n&#039;est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Mailfence n&#039;est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-17T13:52:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-04T15:00:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"Mailfence n&rsquo;est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux\",\"datePublished\":\"2016-08-17T13:52:45+00:00\",\"dateModified\":\"2024-06-04T15:00:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/\"},\"wordCount\":375,\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png\",\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/\",\"url\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png\",\"datePublished\":\"2016-08-17T13:52:45+00:00\",\"dateModified\":\"2024-06-04T15:00:29+00:00\",\"description\":\"R\u00e9cemment, une vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux a \u00e9t\u00e9 divulgu\u00e9e par une \u00e9quipe de chercheurs en s\u00e9curit\u00e9 aux \u00c9tats -Unis. Mais elle ne constituait pas une menace pour nos utilisateurs.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png\",\"width\":600,\"height\":600,\"caption\":\"linux icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\/\/blog.mailfence.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/blog.mailfence.com\/fr\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mailfence n&#8217;est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#website\",\"url\":\"https:\/\/blog.mailfence.com\/fr\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mailfence.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\/\/blog.mailfence.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/mailfence\/\",\"https:\/\/x.com\/mailfence\",\"https:\/\/www.reddit.com\/r\/Mailfence\/\",\"https:\/\/www.linkedin.com\/company\/mailfence\",\"https:\/\/www.instagram.com\/mailfence_\/\",\"https:\/\/www.youtube.com\/@mailfence\",\"https:\/\/en.wikipedia.org\/wiki\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\/in\/mohammadsalmannadeem\",\"https:\/\/x.com\/0xSalman\"],\"url\":\"https:\/\/blog.mailfence.com\/fr\/author\/msalman\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence | Blog","description":"R\u00e9cemment, une vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux a \u00e9t\u00e9 divulgu\u00e9e par une \u00e9quipe de chercheurs en s\u00e9curit\u00e9 aux \u00c9tats -Unis. Mais elle ne constituait pas une menace pour nos utilisateurs.","robots":{"index":"noindex","follow":"follow"},"og_locale":"fr_FR","og_type":"article","og_title":"Mailfence n'est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence Blog","og_description":"Mailfence n'est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2016-08-17T13:52:45+00:00","article_modified_time":"2024-06-04T15:00:29+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"\u00c9crit par":"M Salman Nadeem","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"Mailfence n&rsquo;est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux","datePublished":"2016-08-17T13:52:45+00:00","dateModified":"2024-06-04T15:00:29+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/"},"wordCount":375,"publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png","articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/","url":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/","name":"Vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux | Mailfence | Blog","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png","datePublished":"2016-08-17T13:52:45+00:00","dateModified":"2024-06-04T15:00:29+00:00","description":"R\u00e9cemment, une vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux a \u00e9t\u00e9 divulgu\u00e9e par une \u00e9quipe de chercheurs en s\u00e9curit\u00e9 aux \u00c9tats -Unis. Mais elle ne constituait pas une menace pour nos utilisateurs.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/08\/Mailfence_is_not_vulnerable_to_GNU_Linux1.png","width":600,"height":600,"caption":"linux icon"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/fr\/vulnerabilite-de-tcp-sous-gnu-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/blog.mailfence.com\/fr\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"Mailfence n&#8217;est pas vuln\u00e9rable \u00e0 la vuln\u00e9rabilit\u00e9 de TCP sous GNU\/Linux"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/fr\/#website","url":"https:\/\/blog.mailfence.com\/fr\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/fr\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/fr\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/4157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/comments?post=4157"}],"version-history":[{"count":8,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/4157\/revisions"}],"predecessor-version":[{"id":83603,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/4157\/revisions\/83603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media\/85931"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media?parent=4157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/categories?post=4157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/tags?post=4157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}