NFR Null TCP Packet Vulnerability

Upon receiving a IP packet with the protocol field set to TCP but with an all null TCP header and data section nfrd will die.

nfrd wiill be automatically restarted but the attack packet does not get logged. The nfrd.log file will also be overwritten by the new instance of nfrd.

This opens a window of opourtunity for an attacker to send packets that will not be process by nfrd while it is restarting.


 

Privacy Statement
Copyright 2010, SecurityFocus