The SYN cache (syncache) and SYN cookie (syncookie) mechanism in FreeBSD 4.5 and earlier allows remote attackers to cause a denial of service (crash) (1) via a SYN packet that is accepted using syncookies that causes a null pointer to be referenced for the socket's TCP options, or (2) by killing and restarting a process that listens on the same socket, which does not properly clear the old inpcb pointer on restart.
References
Link | Resource |
---|---|
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:20.syncache.asc | |
http://www.iss.net/security_center/static/8873.php | |
http://www.iss.net/security_center/static/8875.php | Patch Vendor Advisory |
http://www.osvdb.org/6046 | |
http://www.securityfocus.com/bid/4524 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2002-06-11T04:00:00
Updated: 2005-08-17T00:00:00
Reserved: 2002-06-07T00:00:00
Link: CVE-2002-0518
JSON object: View
NVD Information
Status : Analyzed
Published: 2002-08-12T04:00:00.000
Modified: 2008-09-05T20:28:14.257
Link: CVE-2002-0518
JSON object: View
Redhat Information
No data.
CWE