what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

fbsd-ping.txt

fbsd-ping.txt
Posted Feb 24, 2000
Authored by Omachonu Ogali | Site tribune.intranova.net

FreeBSD is vulnerable to a DoS vulnerability involving high speed pinging with packets over 8184 bytes. Unofficial patch included.

tags | exploit, denial of service
systems | freebsd
SHA-256 | e6d81cdb10724ed192d48717002167649620f7b1c8833755743139dcae8ba13d

fbsd-ping.txt

Change Mirror Download

--0-1774392370-951065021=:49727
Content-Type: TEXT/PLAIN; charset=US-ASCII

Attached unofficial patch to drop ICMP packets larger than 8184 bytes.
E-Mail/Flame me if not liked...

I wanted to be able to set the maximum value via sysctl but I'm not sure
if I'll break anything, feel free to pick up from there.

On Sat, 19 Feb 2000 netdude@bc.sympatico.ca wrote:

>
> >Number: 16828
> >Category: kern
> >Synopsis: High Speed Pinging Over 8184 bytes Kills Server Instantly
> >Confidential: no
> >Severity: critical
> >Priority: high
> >Responsible: freebsd-bugs
> >State: open
> >Quarter:
> >Keywords:
> >Date-Required:
> >Class: sw-bug
> >Submitter-Id: current-users
> >Arrival-Date: Sat Feb 19 20:10:01 PST 2000
> >Closed-Date:
> >Last-Modified:
> >Originator: Ahsanul Shajan Alam
> >Release: 3.3-RELEASE
> >Organization:
> TheCoolHost.com, Inc.
> >Environment:
> FreeBSD big_server1.webdevstudio.com 3.3-RELEASE FreeBSD 3.3-RELEASE #0: Thu Sep 16 23:40:35 GMT 1999 jkh@highwing.cdrom.com:/usr/src/sys/compile/GENERIC i386
> >Description:
> High speed pinging to anyone or from anyone on a local ethernet network with packet sizes over 8184 bytes will bring down the server, regardless of whether packets were being directed to it or another target which is online OR offline. Once pinging starts from any other machine, if local the BSD server will go down immediately, if from a remote source, it will go down in a few seconds.
>
> What makes this problem really bad is the fact that the target of the pings does not even have to be the server, it can be any on the ethernet segment...
> >How-To-Repeat:
> pick any LINUX box and do a:
>
> ping -fs 10000 <any IP on the local ethernet network>
>
> But note: if the ping packets are exactly 8184 bytes, the server will just respond back at them and "laugh", if larger (ideally 10000 bytes) the server will die immediately...
> >Fix:
> get upstream provider to disable ping packets from coming in, BUT that will NOT protect you if the source of the pings is on the same ethernet segment. Desparate to find a "cure" to this problem. Please email: netdude@bc.sympatico.ca or president@thecoolhost.com if you know of any solutions, or if anybody can send me exactly what I need to type in to disable pings via IPFW... hmm... Thanks for you time.
>
> >Release-Note:
> >Audit-Trail:
> >Unformatted:
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-bugs" in the body of the message
>

--
+-------------------------------------------------------------------------+
| Omachonu Ogali oogali@intranova.net |
| Intranova Networking Group https://tribune.intranova.net |
| PGP Key ID: 0xBFE60839 |
| PGP Fingerprint: C8 51 14 FD 2A 87 53 D1 E3 AA 12 12 01 93 BD 34 |
+-------------------------------------------------------------------------+

--0-1774392370-951065021=:49727
Content-Type: TEXT/PLAIN; charset=US-ASCII; name="icmp.large.drop"
Content-Transfer-Encoding: BASE64
Content-ID: <Pine.BSF.4.10.10002201143410.49727@hydrant.intranova.net>
Content-Description:
Content-Disposition: attachment; filename="icmp.large.drop"
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--0-1774392370-951065021=:49727--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message

--------------94AC7D254C33FCE49FEB5D0A
Content-Type: text/x-vcard; charset=us-ascii;
name="tomb.vcf"
Content-Transfer-Encoding: 7bit
Content-Description: Card for tom brown
Content-Disposition: attachment;
filename="tomb.vcf"

begin:vcard
n:Brown;Tom
tel;cell:+1 650 814 5949
tel;home:+1 650 566 8715
tel;work:+1 650 812 9400
x-mozilla-html:FALSE
url:https://www.cgf.net/
org:Ministry of Information;Information Adjustment
adr:;;;Menlo Park;California;;USA
version:2.1
email;internet:tomb@cgf.net
title:Historical Adjustments Officer
note:This isn't my real job!
x-mozilla-cpt:;-4864
fn:Tom Brown
end:vcard

--------------94AC7D254C33FCE49FEB5D0A--


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close