Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 22 Apr 2004 07:11:56 -0500
From:      "Jacques A. Vidrine" <nectar@FreeBSD.org>
To:        Frankye - ML <listsucker@ipv5.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Fw: [bugtraq] NetBSD Security Advisory 2004-006: TCP protocol and implementation vulnerability
Message-ID:  <20040422121156.GC29225@madman.celabo.org>
In-Reply-To: <20040422135112.21abe234@godzilla>
References:  <200404210158.i3L1wxoM010197@caligula.anu.edu.au> <20040422135112.21abe234@godzilla>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Apr 22, 2004 at 01:51:12PM +0200, Frankye - ML wrote:
[...]
> Additionally, the 4.4BSD stack from which NetBSD's stack is derived, did
> not even check that a RST's sequence number was inside the window. RSTs
> anywhere to the left of the window were treated as valid.
>
> The fact that this has gone unnoticed for so long is an indication that
> there have not been a large number of RST/SYN DoS attacks ocurring in the
> wild.

Hmm, is this the same issue that we corrected in 1998?  Certainly we
became aware of it because it *was* being exploited.

Cheers,
-- 
Jacques Vidrine / nectar@celabo.org / jvidrine@verio.net / nectar@freebsd.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040422121156.GC29225>