[5625] in bugtraq

home help back first fref pref prev next nref lref last post

Re: The overlapping fragment bug

daemon@ATHENA.MIT.EDU (Paul Leach)
Sat Nov 15 21:17:11 1997

Date: 	Fri, 14 Nov 1997 19:54:17 -0800
Reply-To: Paul Leach <paulle@MICROSOFT.COM>
From: Paul Leach <paulle@MICROSOFT.COM>
X-To:         Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
To: BUGTRAQ@NETSPACE.ORG

July 1, 1997

ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-po
stSP3/icmp-fix/

Which is incorporated with other TCP related fixes at:

ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-po
stSP3/simptcp-fix/

> ----------
> From:         Alan Cox[SMTP:alan@LXORGUK.UKUU.ORG.UK]
> Reply To:     Alan Cox
> Sent:         Friday, November 14, 1997 11:54 AM
> To:   BUGTRAQ@NETSPACE.ORG
> Subject:      The overlapping fragment bug
>
> Well after some testing its quite effective against Linux [fix
> available and will be in 2.0.32 as standard], NT, 95, Win 3.11
> and also a couple of others it seems - DOS Novell TCP/IP and
> PCNFS 4.0 (reportedly). BSD derived stacks, various routers, Solaris
> MacOS and HP/UX all seem fine.
>
> The actual exploit can also be slightly improved. Make it a tcp frame,
> make the destination port 80 and it goes through most firewalls like
> a bullet through cheese and seems to keep its effectiveness.
>
> You can screen the stuff behind a firewall if your firewall reassembles
> fragments (and is of course itself not vulnerable 8)).
>
> Any news on the microsoft fix expected date/times ?
>
> Alan
>

home help back first fref pref prev next nref lref last post