TCP/IP Sequence Prediction Blind Reset Spoofing DoS
"It may be possible to send spoofed RST packets to the remote system."
" . . . vulnerable to a sequence number
approximation bug, which may allow an attacker to send
spoofed RST packets to the remote host and close established
connections . . . "
When I tried to look up info about it - one pages lists "Linux" as vulnerable
(with no additional information) and I am not able to find anything about
Debian's status or relationship to it except possibly for
http://www.mail-archive.com/secure-test...@lists.alioth.debian.org/msg01390.html
which possibly indicates it's fixed, or someone tried to fix it in 2005.
Does anyone know anything about this? I'm needing some kind of fix or
work-around so I can satisfy the scan vendor.
Thanks,
JW
--
----------------------
System Administrator - Cedar Creek Software
http://www.cedarcreeksoftware.com
--
To UNSUBSCRIBE, email to debian-secu...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listm...@lists.debian.org
That says:
CVE-2004-0230 (TCP, when using a large Window Size, makes it easier for remote
...)
NOT-FOR-US: famous TCP RST bug
See here for more information, it seems it is something to care about
only if you do BGP routing:
http://lwn.net/Articles/81560/
See also redhat's statement on this:
http://www.redhat.com/security/data/cve/CVE-2004-0230.html
> Does anyone know anything about this? I'm needing some kind of fix or
> work-around so I can satisfy the scan vendor.
>
Not-a-bug?
Best regards,
--Edwin
> Recently we've had a scanning vendor tell us our Debian Lenny 5.0.3 is
> vulnerable to CVE-2004-0230:
>
> TCP/IP Sequence Prediction Blind Reset Spoofing DoS
>
> "It may be possible to send spoofed RST packets to the remote system."
>
> " . . . vulnerable to a sequence number
> approximation bug, which may allow an attacker to send
> spoofed RST packets to the remote host and close established
> connections . . . "
>
> When I tried to look up info about it - one pages lists "Linux" as vulnerable
> (with no additional information) and I am not able to find anything about
> Debian's status or relationship to it except possibly for
> http://www.mail-archive.com/secure-test...@lists.alioth.debian.org/msg01390.html
> which possibly indicates it's fixed, or someone tried to fix it in 2005.
>
> Does anyone know anything about this? I'm needing some kind of fix or
> work-around so I can satisfy the scan vendor.
It looks to be a known issue, which has been determined to be
unimportant in pretty much all circumstances (i.e. even if it is
successful, it just causes a disconnect, which isn't even an issue
since most configurations will just automatically restablish).
So unless you are doing BGP (Border Gateway Protocol) where disconnects
do have a major impact, I would seriously question the value you are
getting from a scan vendor who makes you worry about issues without
understanding the problem themselves first.
Mike