Fw: [bugtraq] NetBSD Security Advisory 2004-006: TCP protocol
and implementation vulnerability
Jacques A. Vidrine
nectar at FreeBSD.org
Thu Apr 22 05:11:57 PDT 2004
On Thu, Apr 22, 2004 at 01:51:12PM +0200, Frankye - ML wrote:
[...]
> Additionally, the 4.4BSD stack from which NetBSD's stack is derived, did
> not even check that a RST's sequence number was inside the window. RSTs
> anywhere to the left of the window were treated as valid.
>
> The fact that this has gone unnoticed for so long is an indication that
> there have not been a large number of RST/SYN DoS attacks ocurring in the
> wild.
Hmm, is this the same issue that we corrected in 1998? Certainly we
became aware of it because it *was* being exploited.
Cheers,
--
Jacques Vidrine / nectar at celabo.org / jvidrine at verio.net / nectar at freebsd.org
More information about the freebsd-security
mailing list