[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
- read forum
- new topic
- search

- meetings list
- recent additions
- add your info
 top 100 sites
- visit top sites
- sign up now
- members

- add your url
- add domain
- search box
- link to us

- our projects
- free email
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : DoS in rp-pppoe 2.4 and higher

Title: DoS in rp-pppoe 2.4 and higher
Released by: David F. Skoll
Date: 11th December 2000
Printable version: Click here

Hash: SHA1

There is a denial-of-service vulnerability in rp-pppoe versions up to

2.4.  rp-pppoe is a user-space PPPoE client for a bunch of UNIXes and

Linux, used by many residential ADSL customers.

If you use the "Clamp MSS" option and someone crafts a TCP packet with

an (illegal) "zero-length" option, rp-pppoe will fall into an endless loop.

Eventually, the PPP daemon should time out and kill the connection.

Solution:  Upgrade to rp-pppoe 2.5 at http://www.roaringpenguin.com/pppoe/.

If you cannot upgrade quickly, do not use the "Clamp MSS" option until you

can upgrade.

Thanks to Robert Schlabbach for reporting this vulnerability to me.

- --

David F. Skoll

Roaring Penguin Software Inc. | http://www.roaringpenguin.com

GPG fingerprint: 50B4 FA66 CE95 E456 CD8F  96C9 E64D 185C 6646 68E0

GPG public key:  http://www.roaringpenguin.com/dskoll-key.txt


Version: GnuPG v1.0.4 (GNU/Linux)

Comment: pgpenvelope 2.9.0 - http://pgpenvelope.sourceforge.net/





(C) 1999-2000 All rights reserved.