[nsp-sec] New IPV6 NDP issue (via cert)

Chris Morrow morrowc at ops-netman.net
Thu Oct 9 09:56:03 EDT 2008



On Thu, 9 Oct 2008, Gert Doering wrote:

> Hi,
>
> On Thu, Oct 09, 2008 at 01:23:40PM +0000, Chris Morrow wrote:
>> On Thu, 9 Oct 2008, Gert Doering wrote:
>>
>>> (I have not personally verified this, nor do I have a list of affected
>>> OSes, but I have been told that this is the major difference to "plain
>>> ARP spoofing").
>>
>> the cert notice had a list I believe...
>
> Which, at the time when I looked, mostly contained "we don't know yet"...
>
> Supposedly all BSD variants are affected.  Which might or might not affect
> Junipers (if the BSD kernel on the RE believes something, will it end up
> being programmed in the hardware?).  Haven't heard from the Linux camp.

ah I thought I read juniper was marked as vulnerable...

<http://www.kb.cert.org/vuls/id/472363>

says juniper is vulnerable (not sure if that's on the management ether or 
production interfaces...)



More information about the nsp-security mailing list