TCP/BGP vulnerability - easier than you think

Leo Bicknell bicknell at ufp.org
Fri Apr 23 15:15:11 UTC 2004


I point out NetBSD released this:

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc

Of interest is this paragraph:

] Additionally, the 4.4BSD stack from which NetBSD's stack is derived, did
] not even check that a RST's sequence number was inside the window. RSTs
] anywhere to the left of the window were treated as valid.

It's a good thing the 4.4BSD stack was unpopular, otherwise it might be
in a lot of programs.

-- 
       Leo Bicknell - bicknell at ufp.org - CCIE 3440
        PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - tmbg-list-request at tmbg.org, www.tmbg.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20040423/680ca21c/attachment.sig>


More information about the NANOG mailing list