|
Message-ID: <AANLkTikJYAcTAnLynaRzoKr7-kiuwV18QD--_WVOEyuz@mail.gmail.com> Date: Sat, 28 Aug 2010 18:46:01 -0600 From: Kurt Seifried <kurt@...fried.org> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: BGP protocol vulnerability > The BGP protocol and its various extensions require that BGP peering > sessions are terminated when a peer receives a BGP update message > which it considers semantically incorrect, leading to a persistent > denial-of-service condition if the update is received again after the > terminated session is reestablished. > > (This is not something new at all---we just need to get up, treat it > as a vulnerability, and fix it.) This sounds like CVE-2010-3035 http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml or are you talking about another BGP issue? (but in the same "family" as CVE-2009-2055 and CVE-2010-3035). -- Kurt Seifried kurt@...fried.org tel: 1-703-879-3176
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.