Subject: Re: Article
To: Steven M. Bellovin <smb@research.att.com>
From: Manuel Bouyer <bouyer@antioche.eu.org>
List: current-users
Date: 01/11/2003 21:47:54
On Thu, Jan 09, 2003 at 11:06:46AM -0500, Steven M. Bellovin wrote:
> In message <200301091749.47019.kefren@netbastards.org>, Mihai Chelaru writes:
> >Anyone read this ? 
> >http://www.eweek.com/article2/0,3959,809353,00.asp?kc=EWTH102099TX1K0100487
> >
> >"The Linux, NetBSD and Microsoft Windows operating systems are known to 
> >have vulnerable link layer implementations, and it is extremely likely 
> >that other operating systems are also affected." 
> >
> >Any official position regarding this ?
> >
> 
> Speaking for myself, I think this is a non-issue.  (It's also been 
> known for years.)  It's only a vulnerability if the attacker is on the 
> same LAN; if that's the case, ARP-spoofing can yield all traffic, just 

No, it's not restricted to the LAN. If you can make the system send you
a packet smaller than ETHER_MIN_LEN, and the system has a vulnerable driver,
the packet with the leaked data will be routed to your system.

-- 
Manuel Bouyer <bouyer@antioche.eu.org>
     NetBSD: 23 ans d'experience feront toujours la difference
--