Date: Fri, 4 Sep 1998 11:47:31 +0300 (EEST) From: Alexander Litvin <archer@lucky.net> To: Mikael Karpberg <karpen@ocean.campus.luth.se> Cc: hackers@FreeBSD.ORG Subject: Re: Response to RST validation problem? Message-ID: <199809040847.LAA15557@grape.carrier.kiev.ua> In-Reply-To: <199809032137.XAA14593@ocean.campus.luth.se>
index | next in thread | previous in thread | raw e-mail
In article <199809032137.XAA14593@ocean.campus.luth.se> you wrote:
MK> According to Studded:
>> As I'm sure everyone is aware, there was a post on bugtraq Sunday
>> regarding a vulnerability in our TCP code which leaves the system open
>> to attack via RST packets. In the past the project has always responded
MK> Umm... For those of us that don't have time to read Yet Another Mailing
MK> List and are therefor not subscribed to bugtraq... What is the effect
MK> of this attack? I assume you can send some form of packet to the a FreeBSD
MK> machine from a remote computer and get something to happen. What?
MK> Crash, DoS, or rootprompt?
It's DoS. There was an exploit posted, which allows you
to reset any TCP connection, if you know its parameters:
two addresses and two ports.
MK> Personally I'm not too worried if it's not the latter.
MK> I'll just reboot my server is something happens. :-)
MK> I'll upgrade when there is a patch... But if there's a breakin bug
MK> I kinda need to stop it.
MK> /Mikael
---
In the first place, God made idiots;
this was for practice; then he made school boards.
-- Mark Twain
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199809040847.LAA15557>
