All, maybe someone can comment on the status of this alert? There have been some comments about fixing it on freebsd-net@ but I haven't seen a CVS log - or I just missed it.
Thanks. Helge Jacques A. Vidrine: >Does anyone have time to investigate? I will try to get more >information from iDEFENSE. > >Cheers, >-- >Jacques Vidrine / [EMAIL PROTECTED] / [EMAIL PROTECTED] / >[EMAIL PROTECTED] > >----- Forwarded message from Baby Peanut <[EMAIL PROTECTED]> ----- > >Date: Wed, 18 Feb 2004 06:21:25 -0800 (PST) >From: Baby Peanut <[EMAIL PROTECTED]> >To: [EMAIL PROTECTED] >Subject: is this mbuf problem real? >Message-ID: <[EMAIL PROTECTED]> > >BM_207650 >MEDIUM >Vulnerability >Version: 1 2/18/[EMAIL PROTECTED]:47:29 GMT >Initial report > <https://ialert.idefense.com/KODetails.jhtml?irId=207650> >ID#207650: >FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability >(iDEFENSE Exclusive): Remote exploitation of a denial of service (DoS) >vulnerability in FreeBSD's memory buffers (mbufs) could allow attackers >to launch a DoS attack. > >By sending many out-of-sequence packets, a low bandwidth denial of >service attack is possible against FreeBSD. When the targeted system >runs out of memory buffers (mbufs), it is no longer able to accept or >create new connections. > > >Analysis: (iDEFENSE US) Exploitation of this vulnerability requires >that the targeted system has at least one open TCP port. > >The DoS will last until the port is closed, either by the attacker or >the target machine. > >Detection: iDEFENSE has confirmed this vulnerability exists in FreeBSD >5.1 (default install from media). It is expected that it also exists >in earlier versions. > >Exploit: iDEFENSE has proof of concept exploit code demonstrating the >impact of this vulnerability. > > >Vulnerability Types: Design Error - Denial of Service >Prevalence and Popularity: Almost always >Evidence of Active Exploitation or Probing: No known exploitation or >spike in probing >Ease of Exploitation: Remotely Exploitable >Existence and Availability of Exploit Code: An Exploit exists and is >closely traded. >Vulnerability Consequence: Availability > >__________________________________ >Do you Yahoo!? >Yahoo! Mail SpamGuard - Read only the mail you want. >http://antispam.yahoo.com/tools >_______________________________________________ >[EMAIL PROTECTED] mailing list >http://lists.freebsd.org/mailman/listinfo/freebsd-security >To unsubscribe, send any mail to "[EMAIL PROTECTED]" > > >----- End forwarded message ----- > >_______________________________________________ >[EMAIL PROTECTED] mailing list >http://lists.freebsd.org/mailman/listinfo/freebsd-net >To unsubscribe, send any mail to "[EMAIL PROTECTED]" > _______________________________________________ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "[EMAIL PROTECTED]"