Subject: Re: Fwd: Re: TCP Fragment bugs
To: None <port-i386@NetBSD.ORG>
From: Matthias Scheler <tron@lyssa.owl.de>
List: port-i386
Date: 11/17/1997 23:08:28
In article <Pine.NEB.3.96.971117135443.10482A-200000@spamburger.openface.ca>,
	Erik Rungi <blackbox@openface.ca> writes:
> targetted a few of my netbsd machines (1.2, 1.2.1, 1.3_ALPHA all i386)
> and they all survived without any immediate ill

Same here. Neither NetBSD 1.2.1 nor 1.3 are vulnerable to remote attacks.

> If anybody cares to verify this, I'd appreciate it. 

I experienced the same crash when I tried. The problem was fixed in
the meantime by mycroft, from "source-changes":

mycroft
Sun Nov 16 12:58:19 PST 1997
Update of /cvsroot/src/sys/netinet
In directory netbsd1:/var/slash-tmp/cvs-serv1470

Modified Files:
        raw_ip.c 
Log Message:
On output, if the packet length doesn't match the length in the IP header,
drop the packet with EINVAL.

-- 
Matthias Scheler                                http://home.owl.de/~tron/