TCP/BGP vulnerability - easier than you think
Leo Bicknell
bicknell at ufp.org
Fri Apr 23 15:15:11 UTC 2004
I point out NetBSD released this:
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.asc
Of interest is this paragraph:
] Additionally, the 4.4BSD stack from which NetBSD's stack is derived, did
] not even check that a RST's sequence number was inside the window. RSTs
] anywhere to the left of the window were treated as valid.
It's a good thing the 4.4BSD stack was unpopular, otherwise it might be
in a lot of programs.
--
Leo Bicknell - bicknell at ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - tmbg-list-request at tmbg.org, www.tmbg.org
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20040423/680ca21c/attachment.sig>
More information about the NANOG
mailing list