[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] A new TCP/IP blind data injection technique?
- To: Michael Gale <michael@bluesuperman.com>
- Subject: Re: [Full-Disclosure] A new TCP/IP blind data injection technique?
- From: Michal Zalewski <lcamtuf@ghettot.org>
- Date: Sat, 13 Dec 2003 22:13:43 +0100 (CET)
On Sat, 13 Dec 2003, Michael Gale wrote:
> From your e-mail it looks like you need to send a fragmented packet in
> order to exploit this vulnerability. Most firewalls will NOT accept
> fragmented packets.
Neither is true.
Most firewalls accept fragmented packets (but do reassembly). You need to
send a fragment (not an entire packet), and to exploit the vulnerability,
it is perfectly fine for the packet to be reassembled by the recipient's
firewall - it does not have to go through as-is.
--
------------------------- bash$ :(){ :|:&};: --
Michal Zalewski * [http://lcamtuf.coredump.cx]
Did you know that clones never use mirrors?
--------------------------- 2003-12-13 22:11 --
http://lcamtuf.coredump.cx/photo/current/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html