[13990] in bugtraq

home help back first fref pref prev next nref lref last post

Re: unused bit attack alert

daemon@ATHENA.MIT.EDU (antirez)
Wed Feb 23 15:10:55 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000223131406.A187@nagash.suidshell.net>
Date:         Wed, 23 Feb 2000 13:14:06 +0100
Reply-To: antirez@linuxcare.com
From: antirez <antirez@LINUXCARE.COM>
X-To:         bugtraq@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200002212236.OAA01744@daffy.ee.lbl.gov>; from vern@EE.LBL.GOV on
              Mon, Feb 21, 2000 at 02:36:17PM -0800

On Mon, Feb 21, 2000 at 02:36:17PM -0800, Vern Paxson wrote:
> > LigerTeam, strongly propose inserting of
> > solution code before the computing of flag
> > variable.
> >
> >   flag = flags & 0x3f;
>
> Otherwise you are still vulnerable to attackers setting legitimate flags
> in bogus combinations, such as adding URG to a SYN.

Also since the valid TCP flags combinations are fixed
and just ~ 13 at cost of some overhead you can simply
allows only this. An example is the ipt_unclean netfilter
module.
For LigerTeam: this is a known problem, please don't claim
you have discovered it (see BUGTRAQ archive).

antirez

--
Salvatore Sanfilippo, Open Source Developer, Linuxcare Italia spa
+39.049.8024648 tel, +39.049.8036484 fax
antirez@linuxcare.com, http://www.linuxcare.com/
Linuxcare. Support for the revolution.

home help back first fref pref prev next nref lref last post