Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 4 May 1999 17:03:24 -0700
From:      Don Lewis <Don.Lewis@tsc.tdk.com>
To:        Warner Losh <imp@harmony.village.org>, Darren Reed <avalon@coombs.anu.edu.au>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: freebsd mbuf crash
Message-ID:  <199905050003.RAA06539@salsa.gv.tsc.tdk.com>
In-Reply-To: Warner Losh <imp@harmony.village.org> "Re: freebsd mbuf crash" (May  4,  3:03pm)

index | next in thread | previous in thread | raw e-mail

On May 4,  3:03pm, Warner Losh wrote:
} Subject: Re: freebsd mbuf crash
} In message <199905041526.BAA29421@cheops.anu.edu.au> Darren Reed writes:
} : is this one (below) taken care of ?  perhaps a derivitice of this ?
} 
} What's it supposed to do?  I can't get it to cause any grief on my
} -current system, nor on the 3.1-stable based systems we have here at
} work.

I believe this was fixed by version 1.103 of sys/netinet/ip_input.c.
This change was made shortly after 3.0-RELEASE.

The original exploit code only ran correctly on Linux (and nuked FreeBSD
machines).  It didn't do anything interesting when run under FreeBSD, because
the byte order of various IP headers sent on raw sockets differs between
Linux and FreeBSD.  This caused various sanity checks in the FreeBSD stack
to toss the packet instead of sending it.  If you tweak the byte order in
the exploit code, you can get it to run under FreeBSD and crash vulnerable
FreeBSD machines.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199905050003.RAA06539>