[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : DoS in rp-pppoe 2.4 and higher

Title: DoS in rp-pppoe 2.4 and higher
Released by: David F. Skoll
Date: 11th December 2000
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



There is a denial-of-service vulnerability in rp-pppoe versions up to

2.4.  rp-pppoe is a user-space PPPoE client for a bunch of UNIXes and

Linux, used by many residential ADSL customers.



If you use the "Clamp MSS" option and someone crafts a TCP packet with

an (illegal) "zero-length" option, rp-pppoe will fall into an endless loop.

Eventually, the PPP daemon should time out and kill the connection.



Solution:  Upgrade to rp-pppoe 2.5 at http://www.roaringpenguin.com/pppoe/.

If you cannot upgrade quickly, do not use the "Clamp MSS" option until you

can upgrade.



Thanks to Robert Schlabbach for reporting this vulnerability to me.



- --

David F. Skoll

Roaring Penguin Software Inc. | http://www.roaringpenguin.com

GPG fingerprint: 50B4 FA66 CE95 E456 CD8F  96C9 E64D 185C 6646 68E0

GPG public key:  http://www.roaringpenguin.com/dskoll-key.txt

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.0.4 (GNU/Linux)

Comment: pgpenvelope 2.9.0 - http://pgpenvelope.sourceforge.net/



iD8DBQE6NNu15k0YXGZGaOARAlaeAKDTRgTIPoUstrVD//vYEd2oJj9CrgCfQfab

RYrUHNcfytaeNCg0Y3neWZQ=

=rjQt

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.