Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Feb 2004 06:21:25 -0800 (PST)
From:      Baby Peanut <baby_p_nut2@yahoo.com>
To:        freebsd-security@freebsd.org
Subject:   is this mbuf problem real?
Message-ID:  <20040218142125.49433.qmail@web41902.mail.yahoo.com>

next in thread | raw e-mail | index | archive | help
BM_207650
MEDIUM	 
Vulnerability	
Version: 1  2/18/2004@03:47:29 GMT 
Initial report
	 <https://ialert.idefense.com/KODetails.jhtml?irId=207650>;
ID#207650: 	
FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability
(iDEFENSE Exclusive): Remote exploitation of a denial of service (DoS)
vulnerability in FreeBSD's memory buffers (mbufs) could allow attackers
to launch a DoS attack.

By sending many out-of-sequence packets, a low bandwidth denial of
service attack is possible against FreeBSD. When the targeted system
runs out of memory buffers (mbufs), it is no longer able to accept or
create new connections.


Analysis: (iDEFENSE US) Exploitation of this vulnerability requires
that the targeted system has at least one open TCP port.

The DoS will last until the port is closed, either by the attacker or
the target machine.

Detection: iDEFENSE has confirmed this vulnerability exists in FreeBSD
5.1 (default install from media). It is expected that it also exists
in earlier versions.

Exploit: iDEFENSE has proof of concept exploit code demonstrating the
impact of this vulnerability.


Vulnerability Types: Design Error - Denial of Service	 	
Prevalence and Popularity: Almost always	
Evidence of Active Exploitation or Probing: No known exploitation or
spike in probing	
Ease of Exploitation: Remotely Exploitable
Existence and Availability of Exploit Code: An Exploit exists and is
closely traded.	
Vulnerability Consequence: Availability

__________________________________
Do you Yahoo!?
Yahoo! Mail SpamGuard - Read only the mail you want.
http://antispam.yahoo.com/tools



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040218142125.49433.qmail>