OpenBSD Vulnerabilty 55
*no comment* writes "Normally vulnerability reports on slashdot wouldn't make it because there are so many. This one however is for the normally very secure OpenBSD. Someone can crash an OpenBSD bridge using a newly discovered ICMP exploit. More can be read here. This shouldn't affect most people as this only affects people that use OBSD as a bridge."
Can't get to openbsd.org (Score:3, Funny)
Obligatory "No remote exploits in 0 days."
Re:Can't get to openbsd.org (Score:2)
Re:Can't get to openbsd.org (Score:5, Informative)
This exploit is only possible when you have bridging configured, which is not part of a default install, nor most common installations.
Re:Can't get to openbsd.org (Score:3, Informative)
Re:Can't get to openbsd.org (Score:1)
Re:Can't get to openbsd.org (Score:5, Informative)
Re:Can't get to openbsd.org (Score:2, Informative)
Re:Can't get to openbsd.org (Score:2)
Re:Can't get to openbsd.org (Score:5, Informative)
Still not really news (Score:4, Interesting)
This might be unusual but it's really not that big a news. I suppose it shows that even the best are not infallible. Nice to see it's already been patched =).
Are you kidding me? (Score:2, Insightful)
That is, unless it's a vulnerability in Microsoft software.
Re:Are you kidding me? (Score:4, Informative)
Re:Are you kidding me? (Score:2, Interesting)
The biggest microsoft vulnerability is the users. You could simply put up a page with instructions on how to install a backdoor prgram and many clueless users would go right ahead and do it so long as you promised great riches.
The only reason slashdot makes a big deal about microsoft vulnerabilities is because slashdot is pro linux and anit-microsoft. You want proof that slashdot
Re:Are you kidding me? (Score:4, Insightful)
Slashdot is anti-microsoft for a reason -- Microsoft software is technologically inferior. It has way too many severe vulnerabilities. Without a firewall, a fresh Windows 2000 installation will have a worm within a minute of connecting to the internet. And that's without ever opening a single application. No other operating system EVER MADE can compare to that.
No matter what fantasy world you live in, you cannot argue that Windows is not horrifically insecure.
Re:Are you kidding me? (Score:2)
Except for Windows XP. ; )
Re:Are you kidding me? (Score:3, Insightful)
Notice I never said that most windows users have not been affected by a vulnerability? Notice that I said *I* have never been affected? Not being affected has a lot to do with knowing how to secure computer systems and avoid installing suspect software.
I do not disagree that th
Re:Are you kidding me? (Score:3, Interesting)
I know that this is completely offtopic...but I find our seatbelt and helmet laws patently absurd. Your example here is poor, since your view is not universally accepted.
Re:Are you kidding me? (Score:2)
Re:Are you kidding me? (Score:1)
Right on, I'm with you. My post was pretty far off topic and in hindsight...I probably should have kept my mouth shut.
Cheers!
Re:Are you kidding me? (Score:1)
Re:Are you kidding me? (Score:5, Insightful)
Except RedHat Linux 5.x and 6.x.
The RH releases from the same era as W2K had dozens of remote holes in the install and had serveral worms targetting them, a long with lots of script kiddie activity. A study showed that an unpatched RedHat box would be owned in in a mean time of less than 5 minutes. Someone even made t-shirts that said "My other computer is your Linux box."
(However, like Win2000, a RH box could be secured by a competant administrator.)
Trying to judge technological inferiority by bug counts is inane, especially because Unix/Linux doesn't really have a significantly better record than Microsoft. (Compare the record of IIS6 versus Apache over the last year or so, for example...) So I would rephrase your statement: Slashdot is anti-microsoft for a reason -- Slashdot believes their shit don't stink
Where are mod points when I need them? (Score:3, Interesting)
In fact, I recall when RH7.0 came out and was followed almost immediately by 7.1 because of so many remote holes. I've seen several friends have their Linux boxes rooted, and I'm moderator on a Linux forum where we get at least one person a week (some times one a day) asking how they can repair their system because it was cracked.
On the other hand, none of my OpenBSD boxes have ever been cracked... come to think
Re:Where are mod points when I need them? (Score:1)
Re:Where are mod points when I need them? (Score:1)
Which proves nothing (Score:2)
Re:Are you kidding me? (Score:2, Insightful)
Think this should be "I haven't yet noticed of being affected by even one"
Re:Are you kidding me? (Score:5, Insightful)
You may actually think so, but you probably have. Had to wait for a product you ordered because a company involved in making or shipping it was hit by a mail worm? Had a slower internet "experience" because of Blaster? Get more Spam via distributed Spam relays installed by a worm? And I'm not even counting things like not being able to get cash at the ATM because it BSODed because that's not a vulnerability.
Re:Are you kidding me? (Score:1)
Re:Exploit announced: Allows root login to corpses (Score:2)
Why'zit a 'Reliability' fix, not a 'Security' fix? (Score:2, Interesting)
http://openbsd.org/errata.html
"All architectures
016: RELIABILITY FIX: August 26, 2004
As reported by Vafa Izadinia bridge(4)
with IPsec processing enabled can be crashed
remotely by a single ICMP echo traversing the
bridge.
A source code patch exists which remedies this problem.
015: RELIABILITY FIX: August 25, 2004
Improved verification of ICMP errors
in order to minimize the impact of ICMP attacks
against TCP.
http://www.ietf.org/internet-drafts/draft-gont- i cm p-payload-00.txt
A source code patch
Re:Why'zit a 'Reliability' fix, not a 'Security' f (Score:5, Informative)
OpenBSD ICMP vulnerability obviously bogus (Score:4, Funny)
11:55:08 <Niels> OK, man, whatever you say. So who submitted the bug report in the first place?
11:56:23 <Theo> Who cares? It's B-O-G-U-S! Now leave me alone, can't you see I'm busy?! 11:56:29 <Niels> Jeez, would it kill you to give me the details on this alleged bug?
11:59:51 <Niels> Theo? Are you there, man?
^An ^Ap
12:00:00 *** Signoff: Theo (Read error: EOF from client)
^^ typed in shock in an attempt to do a