Fwd: [is this mbuf problem real?]

Jacques A. Vidrine nectar at FreeBSD.org
Wed Feb 18 14:02:31 PST 2004


Does anyone have time to investigate?  I will try to get more
information from iDEFENSE.

Cheers,
-- 
Jacques Vidrine / nectar at celabo.org / jvidrine at verio.net / nectar at freebsd.org

----- Forwarded message from Baby Peanut <baby_p_nut2 at yahoo.com> -----

Date: Wed, 18 Feb 2004 06:21:25 -0800 (PST)
From: Baby Peanut <baby_p_nut2 at yahoo.com>
To: freebsd-security at freebsd.org
Subject: is this mbuf problem real?
Message-ID: <20040218142125.49433.qmail at web41902.mail.yahoo.com>

BM_207650
MEDIUM	 
Vulnerability	
Version: 1  2/18/2004 at 03:47:29 GMT 
Initial report
	 <https://ialert.idefense.com/KODetails.jhtml?irId=207650>
ID#207650: 	
FreeBSD Memory Buffer Exhaustion Denial of Service Vulnerability
(iDEFENSE Exclusive): Remote exploitation of a denial of service (DoS)
vulnerability in FreeBSD's memory buffers (mbufs) could allow attackers
to launch a DoS attack.

By sending many out-of-sequence packets, a low bandwidth denial of
service attack is possible against FreeBSD. When the targeted system
runs out of memory buffers (mbufs), it is no longer able to accept or
create new connections.


Analysis: (iDEFENSE US) Exploitation of this vulnerability requires
that the targeted system has at least one open TCP port.

The DoS will last until the port is closed, either by the attacker or
the target machine.

Detection: iDEFENSE has confirmed this vulnerability exists in FreeBSD
5.1 (default install from media). It is expected that it also exists
in earlier versions.

Exploit: iDEFENSE has proof of concept exploit code demonstrating the
impact of this vulnerability.


Vulnerability Types: Design Error - Denial of Service	 	
Prevalence and Popularity: Almost always	
Evidence of Active Exploitation or Probing: No known exploitation or
spike in probing	
Ease of Exploitation: Remotely Exploitable
Existence and Availability of Exploit Code: An Exploit exists and is
closely traded.	
Vulnerability Consequence: Availability

__________________________________
Do you Yahoo!?
Yahoo! Mail SpamGuard - Read only the mail you want.
http://antispam.yahoo.com/tools
_______________________________________________
freebsd-security at freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org"


----- End forwarded message -----



More information about the freebsd-net mailing list