[<prev] [next>] [day] [month] [year] [list]
Message-ID: <16774.49886.264509.824857@cargo.ozlabs.ibm.com>
Date: Tue, 2 Nov 2004 10:12:30 +1100
From: Paul Mackerras <paulus@...ba.org>
To: Luke Macken <lewk@...too.org>
Cc: gentoo-announce@...too.org, bugtraq@...urityfocus.com,
full-disclosure@...ts.netsys.com, security-alerts@...uxsecurity.com
Subject: Re: [ GLSA 200411-01 ] ppp: Remote denial of service vulnerability
Luke Macken writes:
> The pppd server improperly verifies header fields, making it vulnerable
> to denial of service attacks.
>
> Impact
> ======
>
> An attacker can cause the pppd server to access memory that it isn't
> allowed to, causing the server to crash. No code execution is possible
> with this vulnerability, because no data is getting copied.
Furthermore, only the connection to the attacker will be affected,
since a separate pppd process handles each ppp connection. In other
words, an attacker can terminate their own connection, but they can
not affect any other connection, or prevent new connections from being
established. Given that, I don't think that this is even a DoS
vulnerability.
Paul.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists