All,

maybe someone can comment on the status of this alert? There have been
some comments about fixing it on freebsd-net@ but I haven't seen a CVS
log - or I just missed it.

Thanks.

Helge


Jacques A. Vidrine:
>Does anyone have time to investigate?  I will try to get more
>information from iDEFENSE.
>
>Cheers,
>-- 
>Jacques Vidrine / [EMAIL PROTECTED] / [EMAIL PROTECTED] /
>[EMAIL PROTECTED]
>
>----- Forwarded message from Baby Peanut <[EMAIL PROTECTED]> -----
>
>Date: Wed, 18 Feb 2004 06:21:25 -0800 (PST)
>From: Baby Peanut <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Subject: is this mbuf problem real?
>Message-ID: <[EMAIL PROTECTED]>
>
>BM_207650
>MEDIUM  
>Vulnerability  
>Version: 1  2/18/[EMAIL PROTECTED]:47:29 GMT 
>Initial report
>        <https://ialert.idefense.com/KODetails.jhtml?irId=207650>
>ID#207650:     
>FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability
>(iDEFENSE Exclusive): Remote exploitation of a denial of service (DoS)
>vulnerability in FreeBSD's memory buffers (mbufs) could allow attackers
>to launch a DoS attack.
>
>By sending many out-of-sequence packets, a low bandwidth denial of
>service attack is possible against FreeBSD. When the targeted system
>runs out of memory buffers (mbufs), it is no longer able to accept or
>create new connections.
>
>
>Analysis: (iDEFENSE US) Exploitation of this vulnerability requires
>that the targeted system has at least one open TCP port.
>
>The DoS will last until the port is closed, either by the attacker or
>the target machine.
>
>Detection: iDEFENSE has confirmed this vulnerability exists in FreeBSD
>5.1 (default install from media). It is expected that it also exists
>in earlier versions.
>
>Exploit: iDEFENSE has proof of concept exploit code demonstrating the
>impact of this vulnerability.
>
>
>Vulnerability Types: Design Error - Denial of Service          
>Prevalence and Popularity: Almost always       
>Evidence of Active Exploitation or Probing: No known exploitation or
>spike in probing       
>Ease of Exploitation: Remotely Exploitable
>Existence and Availability of Exploit Code: An Exploit exists and is
>closely traded.        
>Vulnerability Consequence: Availability
>
>__________________________________
>Do you Yahoo!?
>Yahoo! Mail SpamGuard - Read only the mail you want.
>http://antispam.yahoo.com/tools
>_______________________________________________
>[EMAIL PROTECTED] mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-security
>To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
>
>----- End forwarded message -----
>
>_______________________________________________
>[EMAIL PROTECTED] mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-net
>To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>

_______________________________________________
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to