[j-nsp] Juniper and OpenSSH exploits
gert at greenie.muc.de
Tue Sep 23 15:56:59 EDT 2003
On Tue, Sep 23, 2003 at 08:39:20AM -0400, Jeff Aitken wrote:
> On Tue, Sep 23, 2003 at 10:58:40AM +0300, Pekka Savola wrote:
> > Are you really running your junipers without a filter running on lo0.0,
> > protecting TCP/22, etc? If such are implemented properly, this issue is
> > not all that intresting..
> Is it not true that a single packet (i.e., a packet with an
> appropriately spoofed source-IP such that it will make it through
> the filter) can cause problems? Or is two-way conversation between
> the router and the attacker required in order to exploit the
The current buffer problems happen inside an established TCP connection.
One packet won't be sufficient for that, you need to be able to spoof
USENET is *not* the non-clickable part of WWW!
Gert Doering - Munich, Germany gert at greenie.muc.de
fax: +49-89-35655025 gert at net.informatik.tu-muenchen.de
More information about the juniper-nsp