Date: Thu, 22 Apr 2004 07:11:56 -0500 From: "Jacques A. Vidrine" <nectar@FreeBSD.org> To: Frankye - ML <listsucker@ipv5.net> Cc: freebsd-security@freebsd.org Subject: Re: Fw: [bugtraq] NetBSD Security Advisory 2004-006: TCP protocol and implementation vulnerability Message-ID: <20040422121156.GC29225@madman.celabo.org> In-Reply-To: <20040422135112.21abe234@godzilla> References: <200404210158.i3L1wxoM010197@caligula.anu.edu.au> <20040422135112.21abe234@godzilla>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Apr 22, 2004 at 01:51:12PM +0200, Frankye - ML wrote: [...] > Additionally, the 4.4BSD stack from which NetBSD's stack is derived, did > not even check that a RST's sequence number was inside the window. RSTs > anywhere to the left of the window were treated as valid. > > The fact that this has gone unnoticed for so long is an indication that > there have not been a large number of RST/SYN DoS attacks ocurring in the > wild. Hmm, is this the same issue that we corrected in 1998? Certainly we became aware of it because it *was* being exploited. Cheers, -- Jacques Vidrine / nectar@celabo.org / jvidrine@verio.net / nectar@freebsd.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040422121156.GC29225>