DaemonForums  

Go Back   DaemonForums > DaemonForums.org > News

News News regarding BSD and related.

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 1st May 2014
J65nko J65nko is online now
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 3,244
Thanked 182 Times in 149 Posts
Default Staunch your Heartbleed patching: FreeBSD has a nasty credentials leak

From http://www.theregister.co.uk/2014/05...k_credentials/

Quote:
Got FreeBSD? Get busy on the patch, because a problem with its TCP ordering has emerged, with both denial-of-service and potential data leaks as the vulnerabilities.

The issue exists in how the popular Unix-like operating system handles TCP packets received out-of-order.
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Reply With Quote
  #2   (View Single Post)  
Old 9th May 2014
censored censored is offline
Swen Tnavelerri
 
Join Date: Jan 2014
Posts: 47
Thanked 0 Times in 0 Posts
Default

I've had FreeBSD for a long while. I had gotten to the point where I had pretty good confidence in the basic TCP/IP stack. BSD and its progenitor was the birth of the protocol. The security advisory indicates that *all* versions of FreeBSD were affected. How *all* is "all?" Back to the beginning of time? Or is it not that bad? I didn't see a specific version endpoint. So, are they saying that the stack's always been that way? If so, then the *many* other operating systems that have "borrowed" parts of the BSD TCP/IP stack could be vulnerable. Even Windows does, or did, use pieces and parts of the BSD TCP/IP stack. Can anyone shed more light on this?
Reply With Quote
  #3   (View Single Post)  
Old 12th May 2014
gpatrick gpatrick is offline
Shell Scout
 
Join Date: Nov 2009
Posts: 128
Thanked 0 Times in 0 Posts
Default

The security advisory does not state *ALL* versions of FreeBSD. From US CERT NVD:
Quote:
CVE-2014-3000

Summary: The TCP reassembly function in the inet module in FreeBSD 8.3 before p16, 8.4 before p9, 9.1 before p12, 9.2 before p5, and 10.0 before p2 allows remote attackers to cause a denial of service (undefined memory access and system crash) or possibly read system memory via multiple crafted packets, related to moving a reassemble queue entry to the segment list when the queue is full.
Published: 5/2/2014 10:55:07 AM

CVSS Severity: 7.8 HIGH
However, I think that is because those are the only releases that are presently supported, and would likely include those preceding 8.3 if they were supported.
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Nasty IE Zero-Day Used in Attacks Against Defense, Financial Sectors: FireEye J65nko News 0 28th April 2014 01:04 PM
Security Tech giants, chastened by Heartbleed, finally agree to fund OpenSSL J65nko News 0 24th April 2014 02:58 PM
Security GitHub search exposes uploaded credentials J65nko News 1 26th January 2013 12:15 AM
Security Hackers leak '1 MILLION records' on Apple fanbois from FEDS J65nko News 4 11th September 2012 08:08 AM
patching or updating ? dennky OpenBSD Installation and Upgrading 12 14th January 2010 07:17 PM


All times are GMT. The time now is 11:54 PM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick