Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Feb 2004 08:43:24 +0100 (MET)
From:      Helge Oldach <helge.oldach@atosorigin.com>
To:        nectar@freebsd.org (Jacques A. Vidrine)
Cc:        freebsd-net@freebsd.org
Subject:   Re: Fwd: [is this mbuf problem real?]
Message-ID:  <200402260743.IAA18903@galaxy.hbg.de.ao-srv.com>
In-Reply-To: <20040218220230.GF47727@madman.celabo.org> from "Jacques A. Vidrine" at "Feb 18, 2004 11: 2:30 pm"

next in thread | previous in thread | raw e-mail | index | archive | help
All,

maybe someone can comment on the status of this alert? There have been
some comments about fixing it on freebsd-net@ but I haven't seen a CVS
log - or I just missed it.

Thanks.

Helge


Jacques A. Vidrine:
>Does anyone have time to investigate?  I will try to get more
>information from iDEFENSE.
>
>Cheers,
>-- 
>Jacques Vidrine / nectar@celabo.org / jvidrine@verio.net /
>nectar@freebsd.org
>
>----- Forwarded message from Baby Peanut <baby_p_nut2@yahoo.com> -----
>
>Date: Wed, 18 Feb 2004 06:21:25 -0800 (PST)
>From: Baby Peanut <baby_p_nut2@yahoo.com>
>To: freebsd-security@freebsd.org
>Subject: is this mbuf problem real?
>Message-ID: <20040218142125.49433.qmail@web41902.mail.yahoo.com>
>
>BM_207650
>MEDIUM	 
>Vulnerability	
>Version: 1  2/18/2004@03:47:29 GMT 
>Initial report
>	 <https://ialert.idefense.com/KODetails.jhtml?irId=207650>;
>ID#207650: 	
>FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability
>(iDEFENSE Exclusive): Remote exploitation of a denial of service (DoS)
>vulnerability in FreeBSD's memory buffers (mbufs) could allow attackers
>to launch a DoS attack.
>
>By sending many out-of-sequence packets, a low bandwidth denial of
>service attack is possible against FreeBSD. When the targeted system
>runs out of memory buffers (mbufs), it is no longer able to accept or
>create new connections.
>
>
>Analysis: (iDEFENSE US) Exploitation of this vulnerability requires
>that the targeted system has at least one open TCP port.
>
>The DoS will last until the port is closed, either by the attacker or
>the target machine.
>
>Detection: iDEFENSE has confirmed this vulnerability exists in FreeBSD
>5.1 (default install from media). It is expected that it also exists
>in earlier versions.
>
>Exploit: iDEFENSE has proof of concept exploit code demonstrating the
>impact of this vulnerability.
>
>
>Vulnerability Types: Design Error - Denial of Service	 	
>Prevalence and Popularity: Almost always	
>Evidence of Active Exploitation or Probing: No known exploitation or
>spike in probing	
>Ease of Exploitation: Remotely Exploitable
>Existence and Availability of Exploit Code: An Exploit exists and is
>closely traded.	
>Vulnerability Consequence: Availability
>
>__________________________________
>Do you Yahoo!?
>Yahoo! Mail SpamGuard - Read only the mail you want.
>http://antispam.yahoo.com/tools
>_______________________________________________
>freebsd-security@freebsd.org mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-security
>To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
>
>
>----- End forwarded message -----
>
>_______________________________________________
>freebsd-net@freebsd.org mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-net
>To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org"
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200402260743.IAA18903>