From nobody Wed Nov 30 21:58:09 2022 X-Original-To: freebsd-security@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NMtPN5QfGz4j6wF for ; Wed, 30 Nov 2022 21:58:16 +0000 (UTC) (envelope-from devnull@apt322.org) Received: from gateway20.websitewelcome.com (gateway20.websitewelcome.com [192.185.58.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4NMtPN2V30z3vbH for ; Wed, 30 Nov 2022 21:58:16 +0000 (UTC) (envelope-from devnull@apt322.org) Authentication-Results: mx1.freebsd.org; none Received: from atl1wswcm02.websitewelcome.com (unknown [50.6.129.163]) by atl1wswob01.websitewelcome.com (Postfix) with ESMTP id 256934013A40B for ; Wed, 30 Nov 2022 21:58:15 +0000 (UTC) Received: from br366.hostgator.com.br ([108.167.188.48]) by cmsmtp with ESMTP id 0V5rpXYl84ZGb0V5rpCfHI; Wed, 30 Nov 2022 21:58:15 +0000 X-Authority-Reason: nr=8 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=apt322.org; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:From: References:To:MIME-Version:Date:Message-ID:Sender:Reply-To:Cc:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=q+ZknU4KpE/pylzU/CYB0r0KaNwLZ5fgPTH952g0zjI=; b=Y4dw0xEsW0EWmUxy7NUJn9kTiP lvQnaQhiklnqtf2nA8kuCy2hLuFJRtG3FrlyWazMYNuwXuaJzwvatF71OY5yBL+zQw96GLyXWMp4A ZUVhdMaQM7r7l/mA/DV7abDIK/Jt6y2R/julME70uBSSMKOflFFy7hEoEp7aAFD/mQcNF3tFdwRsJ MkGzhYZJMEe9cYikwBhEvnubxZAVkWxBwABUwyyieecRs+t/PBo4nrN9KGcslxHsr1DTgsmJ6MRt2 6mD0Bd1iFBY12JCCnb+HdQR2Nte7MeZDkEWA4LufNuyBqRqtP1IOUJ8AyG/9Xe9RRGTNBcNqvBhoO XnNJ0GcQ==; Received: from [45.238.229.20] (port=14606 helo=[192.168.0.100]) by br366.hostgator.com.br with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.95) (envelope-from ) id 1p0V5q-001UPr-QL; Wed, 30 Nov 2022 18:58:14 -0300 Message-ID: Date: Wed, 30 Nov 2022 18:58:09 -0300 List-Id: Security issues List-Archive: https://lists.freebsd.org/archives/freebsd-security List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-security@freebsd.org X-BeenThere: freebsd-security@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 To: mike tancsa , freebsd-security@freebsd.org References: <20221130004601.043CE1C623@freefall.freebsd.org> <3dc86282-165d-8562-5cba-0da9896557b9@sentex.net> Content-Language: en-US From: Dev Null Subject: Re: FreeBSD Security Advisory FreeBSD-SA-22:15.ping In-Reply-To: <3dc86282-165d-8562-5cba-0da9896557b9@sentex.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - br366.hostgator.com.br X-AntiAbuse: Original Domain - freebsd.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - apt322.org X-BWhitelist: no X-Source-IP: 45.238.229.20 X-Source-L: No X-Exim-ID: 1p0V5q-001UPr-QL X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: ([192.168.0.100]) [45.238.229.20]:14606 X-Source-Auth: devnull@apt322.org X-Email-Count: 1 X-Source-Cap: bXVuZG9zODg7bXVuZG9zODg7YnIzNjYuaG9zdGdhdG9yLmNvbS5icg== X-Local-Domain: yes X-CMAE-Envelope: MS4xfO36zBrfjrD9nnijsEx5S50EEb2Az9gXxr5kcy4mTsWdV5/RLrfnLXCgPS612qu9QucdONiMn1Y96xi/1ExaYi83LtjNXfSnEm1/GteEupWZxhP6nDcP nMcwhDyVNpOQu+8pRwmiOwVxubuOcTVM7JNlmeHlDXwvSavcFBW2R8111D+CbDjPC1DhEZJv9DZ4soAtr7/1qHfwpJgXvnYWSw0= X-Rspamd-Queue-Id: 4NMtPN2V30z3vbH X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:19871, ipnet:192.185.58.0/23, country:US] X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-ThisMailContainsUnwantedMimeParts: N Easily to exploit in a test environment, but difficult to be exploited in the wild, since the flaw only can be exploited in the ICMP reply, so the vulnerable machine NEEDS to make an ICMP request first. The attacker in this case, send a short reader in ICMP reply. -- Rafael Grether On 30/11/22 10:01, mike tancsa wrote: > > How likely is this bug exploited ?  I am guessing Man-in-the-middle > makes this a little more of an issue potentially > >     ---Mike >