Re: FreeBSD Security Advisory FreeBSD-SA-14:08.tcp

看板FB_security作者時間11年前 (2014/05/02 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串6/21 (看更多)
--On 30 April 2014 04:35:10 +0000 FreeBSD Security Advisories <security-advisories@freebsd.org> wrote: > II. Problem Description > > FreeBSD may add a reassemble queue entry on the stack into the segment > list when the reassembly queue reaches its limit. The memory from the > stack is undefined after the function returns. Subsequent iterations of > the reassembly function will attempt to access this entry. Hi, Does this require an established TCP session to be present? - i.e. If you have a host which provides no external TCP sessions (i.e. replies 'Connection Refused' / drops the initial SYN) would that still be potentially exploitable? What about boxes used as routers - that just forward the traffic (and again, offer no TCP services directly themselves)? -Karl _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1JOelVA9 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1JOelVA9 (FB_security)