Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 4 Sep 1998 11:47:31 +0300 (EEST)
From:      Alexander Litvin <archer@lucky.net>
To:        Mikael Karpberg <karpen@ocean.campus.luth.se>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: Response to RST validation problem?
Message-ID:  <199809040847.LAA15557@grape.carrier.kiev.ua>
In-Reply-To: <199809032137.XAA14593@ocean.campus.luth.se>

next in thread | previous in thread | raw e-mail | index | archive | help
In article <199809032137.XAA14593@ocean.campus.luth.se> you wrote:
MK> According to Studded:
>> As I'm sure everyone is aware, there was a post on bugtraq Sunday
>> regarding a vulnerability in our TCP code which leaves the system open
>> to attack via RST packets. In the past the project has always responded

MK> Umm... For those of us that don't have time to read Yet Another Mailing
MK> List and are therefor not subscribed to bugtraq... What is the effect
MK> of this attack? I assume you can send some form of packet to the a FreeBSD
MK> machine from a remote computer and get something to happen. What?
MK> Crash, DoS, or rootprompt?

It's DoS. There was an exploit posted, which allows you
to reset any TCP connection, if you know its parameters:
two addresses and two ports.

MK> Personally I'm not too worried if it's not the latter.
MK> I'll just reboot my server is something happens. :-)
MK> I'll upgrade when there is a patch...  But if there's a breakin bug
MK> I kinda need to stop it.

MK>   /Mikael

--- 
In the first place, God made idiots;
this was for practice; then he made school boards.
                -- Mark Twain

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199809040847.LAA15557>