[11247] in bugtraq

home help back first fref pref prev next nref lref last post

Nifty DoS in Foundry networks gear.

daemon@ATHENA.MIT.EDU (Jan B. Koum)
Wed Aug 4 21:07:43 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <19990802165843.A6684@best.com>
Date:         Mon, 2 Aug 1999 16:58:43 -0700
Reply-To: "Jan B. Koum" <jkb@BEST.COM>
From: "Jan B. Koum" <jkb@BEST.COM>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

	Running tcp nmap scan against Foundry network gear make it go boom.
What makes it more sad is that Foundry is in the networking business -- they
route packets. They don't make toasters which get it's tcp/ip stack written by
a recent CS grad. Anyway, the version I have which reboots after simple
"nmap <host>" is:

telnet@XXX.mail#sh ver
 SW: Version 05.0.94T13 Copyright (c) 1996-1999 Foundry Networks, Inc.
     Compiled on Jun  8 1999 at 15:46:09 labeled as N8R05094
 HW: NetIron Gigabit Switching Router, serial number 01a5a4
 200 MHz Power PC processor 603 (revision 7) with 32756K bytes of DRAM
  16 100BaseT interfaces with Level 1 Transceiver LXT975
   2 GIGA uplink interfaces, SX
[.. snip ..]

Octal System, Maximum Code Image Size Supported: 1965568 (0x001dfe00)
The system uptime is 1 minutes 47 seconds


	This is NetIron series -- not sure about other hardware...

	I notified Foundry two weeks ago -- but they do not seem to be able
to reproduce the problem themself (I also wasn't able to crash a foundry on
our LAN running  05.0.02T13  version of their software).


-- Yan

home help back first fref pref prev next nref lref last post