[nsp-sec] Potential TCP / IP vulnerabilities announced midOctober - Outpost24 interview

Barry Raveendran Greene bgreene at senki.org
Tue Sep 30 17:35:20 EDT 2008


I'm listening to this now. It looks like they are playing to client side
cookies to get state to saturate. This one sounds new. 


> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> Florian Weimer
> Sent: Tuesday, September 30, 2008 9:57 AM
> To: Kick Fronenbroek
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] Potential TCP / IP vulnerabilities 
> announced midOctober - Outpost24 interview
> 
> ----------- nsp-security Confidential --------
> 
> * Kick Fronenbroek:
> 
> > On Dutch news sites, reports are posted on a flaw in TCP/IP 
> which will 
> > be presented mid October in Finland at:
> > 
> http://www.t2.fi/2008/08/27/jack-c-louis-and-robert-e-lee-to-talk-abou
> > t-new-
> > dos-attack-vectors/
> 
> There are several published but mostly unfixed TCP attacks.  
> Netkill is one of them (it reduces the TCP receive window 
> size to zero after the connection is handled exclusively by 
> the kernel on the sending side).  Anotherone is optimistic 
> ACKing, were you send ACKs faster than your actual link, 
> trying to convince the sender to waste packets on you instead 
> of legitimate clients.  There's also an old attack abusing 
> path MTU discovery (reducing the segment size to something 
> like 40 bytes), but quite a few vendors have actually fixed this one.
> 
> Chances are good that it's just a rediscovery of those really 
> old issues.
> 
> -- 
> Florian Weimer                <fweimer at bfk.de>
> BFK edv-consulting GmbH       http://www.bfk.de/
> Kriegsstraße 100              tel: +49-721-96201-1
> D-76133 Karlsruhe             fax: +49-721-96201-99
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security community. Confidentiality is essential for 
> effective Internet security counter-measures.
> _______________________________________________
> 




More information about the nsp-security mailing list