[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.44.0412151331480.1826-100000@isec.pl>
Date: Wed, 15 Dec 2004 13:34:33 +0100 (CET)
From: Paul Starzetz <ihaquer@...c.pl>
To: stephen joseph butler <stephen.butler@...il.com>
Cc: security@...c.pl, <bugtraq@...urityfocus.com>,
<vulnwatch@...nwatch.org>, <full-disclosure@...ts.netsys.com>
Subject: Re: Linux kernel IGMP vulnerabilities
On Tue, 14 Dec 2004, stephen joseph butler wrote:
> > /proc/net/igmp
> > /proc/net/mcfilter
> >
> > if both exist and are non-empty you are vulnerable!
>
> Just to be clear: if "mcfilter" is empty, then you aren't vulnerable?
> I have both files, and "igmp" contains data, but "mcfilter" is empty.
You are not vulnerable to the remote attack described under (3), however
your kernel may be still buggy. Note that you need a running process that
has manipulated its multicast socket filters. If your kernel is buggy and
you have local users such an application can always appear, at a time you
don't expect it.
--
Paul Starzetz
iSEC Security Research
http://isec.pl/
Powered by blists - more mailing lists