[8773] in bugtraq

home help back first fref pref prev next nref lref last post

Re: your mail

daemon@ATHENA.MIT.EDU (Alan Cox)
Tue Dec 22 14:34:06 1998

Date: 	Tue, 22 Dec 1998 13:16:47 +0000
Reply-To: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <19981221140040.A11801@quadrunner.com> from "Craig A. Huegen" at
              Dec 21, 98 02:00:40 pm

> It should be pointed out here that ICMP redirects are not the only
> kinds of attacks which can be carried out against these devices.
>
> Our wonderful denial of service friends land, nestea, nestea2, et al,
> can wreak havoc on these devices as well.
>
> Your best bet as a user of these devices is to impose very restrictive
> filters, or insure that these systems are not vulnerable to all
> of the attacks against IP stacks that have been discovered.

A very large number of these embedded devices run the same two or three
tcp stacks. Several of them hang when fed a zero length IP option (old
KA9Q based). The other thing is nestea/nestea2 can be a pain. The tools
may deliver them UDP but they can equally be delivered tcp at port 80,
or the lpd port or other similar. This makes it quite hard to firewall

Finally some impromptu testing with third parties indicates that the
'all embedded boxes have crashable tcp' theory extends to most of the
beta/just being rolled out set top box internet devices from cable
companies.

Alan

home help back first fref pref prev next nref lref last post