Hello, We have ported TCP/IP Stack from FreeBSD4.4 Lite to OS/2. We would like to know, if the TCP/IP reset spoofing vulnerability has been taken care in FreeBSD4.4 Lite? We are aware that this vulnerability affects 2.2-stable systems from before September 16, 1998. -stable systems after that date do not suffer from this problem. It will also apply to FreeBSD 2.2.6 and 2.2.7. We would like to know if the patch given in FreeBSD-SA-98_07_rst_asc.htm applies to FreeBSD4.4lite as well? Please help! Regards, Amith __________________________________ Do you Yahoo!? Yahoo! Mail - You care about security. So do we. http://promotions.yahoo.com/new_mail
amith bc <amithbc_in@yahoo.com> writes:> We have ported TCP/IP Stack from FreeBSD4.4 Lite to OS/2.There is no such thing as FreeBSD 4.4 Lite. DES -- Dag-Erling Sm?rgrav - des@des.no
Hi, Thanks for your early response. But what about the solution for TCP reset spoofing? I also do not see any sequence number checking being done in the code I am using. The tcp_input.c that I am using is dated 8.12 (Berkeley) 5/24/95. Can you please help us in finding which BSD level/version this belongs to?As far as I know, we use FreeBSD4.4. Please correct us if we are wrong. And how is TCP Reset spoofing vulnerability taken care in BSD? Pl. refer this site which talks of this vulnerability. http://www.osvdb.org/displayvuln.php?osvdb_id=4030. Related issue to this is http://www.osvdb.org/displayvuln.php?osvdb_id=6094 for which BSD has given patches. Please help as this is critical to our project. Regards, Amith --- Dag-Erling_Smørgrav <des@des.no> wrote:> amith bc <amithbc_in@yahoo.com> writes: > > We have ported TCP/IP Stack from FreeBSD4.4 Lite > to OS/2. > > There is no such thing as FreeBSD 4.4 Lite. > > DES > -- > Dag-Erling Smørgrav - des@des.no >__________________________________ Do you Yahoo!? Read only the mail you want - Yahoo! Mail SpamGuard. http://promotions.yahoo.com/new_mail