aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2006-02-14 18:35:40 +0800
committerremko <remko@FreeBSD.org>2006-02-14 18:35:40 +0800
commitfa7f557d70f11a3003146c6d2c8501de7f801641 (patch)
tree063b381114bfa57f503493c653265e539a7b84e3 /security
parent4659543a20ef22c622225c27dbc4351e4e48bb93 (diff)
downloadfreebsd-ports-gnome-fa7f557d70f11a3003146c6d2c8501de7f801641.tar.gz
freebsd-ports-gnome-fa7f557d70f11a3003146c6d2c8501de7f801641.tar.zst
freebsd-ports-gnome-fa7f557d70f11a3003146c6d2c8501de7f801641.zip
Document FreeBSD -- Infinite loop in SACK handling (FreeBSD SA 06.08)
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 00c697263882..f094118b185a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="dfb71c00-9d44-11da-8c1d-000e0c2e438a">
+ <topic>FreeBSD -- Infinite loop in SACK handling</topic>
+ <affects>
+ <system>
+ <name>FreeBSD</name>
+ <range><gt>5.4</gt><lt>5.4_11</lt></range>
+ <range><gt>5.3</gt><lt>5.3_26</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem description:</p>
+ <p>When insufficient memory is available to handle an
+ incoming selective acknowledgement, the TCP/IP stack may
+ enter an infinite loop.</p>
+ <p>Impact:</p>
+ <p>By opening a TCP connection and sending a carefully crafted
+ series of packets, an attacker may be able to cause a denial
+ of service.</p>
+ <p>Workaround:</p>
+ <p>On FreeBSD 5.4, the net.inet.tcp.sack.enable sysctl can be used to
+ disable the use of SACK:</p>
+ <p># sysctl net.inet.tcp.sack.enable=0</p>
+ <p>No workaround is available for FreeBSD 5.3.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-0433</cvename>
+ <freebsdsa>SA-06:08</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2006-02-01</discovery>
+ <entry>2006-02-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="52ba7713-9d42-11da-8c1d-000e0c2e438a">
<topic>pf -- IP fragment handling panic</topic>
<affects>