[j-nsp] Juniper and OpenSSH exploits

Gert Doering gert at greenie.muc.de
Tue Sep 23 15:56:59 EDT 2003


On Tue, Sep 23, 2003 at 08:39:20AM -0400, Jeff Aitken wrote:
> On Tue, Sep 23, 2003 at 10:58:40AM +0300, Pekka Savola wrote:
> > Are you really running your junipers without a filter running on lo0.0, 
> > protecting TCP/22, etc?  If such are implemented properly, this issue is 
> > not all that intresting..
> Is it not true that a single packet (i.e., a packet with an
> appropriately spoofed source-IP such that it will make it through
> the filter) can cause problems?  Or is two-way conversation between
> the router and the attacker required in order to exploit the
> vulnerability?

The current buffer problems happen inside an established TCP connection.

One packet won't be sufficient for that, you need to be able to spoof
the 3way-Handshake.

USENET is *not* the non-clickable part of WWW!
Gert Doering - Munich, Germany                             gert at greenie.muc.de
fax: +49-89-35655025                        gert at net.informatik.tu-muenchen.de

More information about the juniper-nsp mailing list