NetBSD advisory: denial of service using bogus fragmented IPv4

14

Author: JT Smith

NetBSD.org: “Malicious parties may be able to prevent a NetBSD node from
communicating with other nodes by transmitting a lot of bogus
fragmented IPv4 packets.

For the attack to be effective, the attacker needs to have good
network connectivity to the victim node (like logged onto the victim
machine itself, connected by a fat LAN, or whatever).”

Category:

  • Linux