Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (UNIX)  >   TCP/IP Stack Implementation Vendors:   OpenBSD
OpenBSD tcp(4) Bugs in Processing SACK Options Let Remote Users Deny Service
SecurityTracker Alert ID:  1013611
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 30 2005
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): OpenBSD 3.5, 3.6
Description:   A vulnerability was reported in OpenBSD in the TCP stack implementation. A remote user can cause the system to crash.

A remote user can send TCP packets with invalid SACK options to trigger flaws in the tcp(4) stack on the target system. This may cause all available memory to be consumed or the target system to crash.

The vulnerabilities reside in 'tcp_input.c' and 'tcp_usrreq.c'.

Impact:   A remote user can cause denial of service conditions on the target system, such as memory exhaustion or a crash.
Solution:   The vendor has issued the following patches:

Vendor URL: (Links to External Site)
Cause:   Exception handling error, State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC