[nsp-sec] Potential TCP / IP vulnerabilities announced midOctober - Outpost24 interview
Barry Raveendran Greene
bgreene at senki.org
Tue Sep 30 17:35:20 EDT 2008
I'm listening to this now. It looks like they are playing to client side
cookies to get state to saturate. This one sounds new.
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> Florian Weimer
> Sent: Tuesday, September 30, 2008 9:57 AM
> To: Kick Fronenbroek
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] Potential TCP / IP vulnerabilities
> announced midOctober - Outpost24 interview
>
> ----------- nsp-security Confidential --------
>
> * Kick Fronenbroek:
>
> > On Dutch news sites, reports are posted on a flaw in TCP/IP
> which will
> > be presented mid October in Finland at:
> >
> http://www.t2.fi/2008/08/27/jack-c-louis-and-robert-e-lee-to-talk-abou
> > t-new-
> > dos-attack-vectors/
>
> There are several published but mostly unfixed TCP attacks.
> Netkill is one of them (it reduces the TCP receive window
> size to zero after the connection is handled exclusively by
> the kernel on the sending side). Anotherone is optimistic
> ACKing, were you send ACKs faster than your actual link,
> trying to convince the sender to waste packets on you instead
> of legitimate clients. There's also an old attack abusing
> path MTU discovery (reducing the segment size to something
> like 40 bytes), but quite a few vendors have actually fixed this one.
>
> Chances are good that it's just a rediscovery of those really
> old issues.
>
> --
> Florian Weimer <fweimer at bfk.de>
> BFK edv-consulting GmbH http://www.bfk.de/
> Kriegsstraße 100 tel: +49-721-96201-1
> D-76133 Karlsruhe fax: +49-721-96201-99
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the
> nsp-security community. Confidentiality is essential for
> effective Internet security counter-measures.
> _______________________________________________
>
More information about the nsp-security
mailing list