Subject: CERT VU#637934 (PAWS)
To: None <tech-security@netbsd.org>
From: Ed Ravin <eravin@panix.com>
List: tech-security
Date: 06/27/2005 01:10:05
What's the status of this vulnerability with NetBSD?  CERT lists NetBSD as
"unknown", notified March 9, 2005.  Both FreeBSD and OpenBSD are listed as
"vulnerable".

-------------------
  http://www.kb.cert.org/vuls/id/637934

  TCP does not adequately validate segments before updating timestamp value

  Overview

  Certain TCP implementations may allow a remote attacker to arbitrarily
  modify host timestamp values, leading to a denial-of-service condition.

  I. Description

  The Transmission Control Protocol (TCP) is defined in RFC 793 as a means to
  provides reliable host-to-host transmission between hosts in a
  packet-switched computer networks. RFC 1323 introduced techniques to
  increase the performance of TCP. Two such techniques are TCP timestamps and
  Protection Against Wrapped Sequence Numbers (PAWS).