Re: NAI Security Advisory - Windows IP source routing

From: Eric D. Williams (ericat_private)
Date: Wed Sep 22 1999 - 06:51:47 PDT

  • Next message: Charles D. O'Dale: "IE5 Automated format of HD, no ActiveX required"

    Logically speaking I would think, unless the stack has been modified (read
    replaced)
    with an implementation other than MS's then that system would also be
    vulnerable.
    
    In the case of packet filtering however, it would seem to be mitigated by the
    destination address
    entries in the filtering setup.  So, perhaps filtering would not be vulnerable
    if configured correctly.
    
    Eric
    Eric Williams, Pres.
    Information Brokers, Inc.    Phone: +1 202.889.4395
    http://www.infobro.com/        Fax: +1 202.889.4396
    mailto:ericat_private
               For More Info: infoat_private
    
    
    On Tuesday, September 21, 1999 3:34 AM, Holger Heimann [SMTP:hh@IT-SEC.DE]
    wrote:
    > > Windows TCP/IP stacks configured to disable IP forwarding or IP
    > > source routing, allow specific source routed datagrams to route
    > > between interfaces.  Effectively, the Windows TCP/IP stack can
    > > not be configured to disable IP datagrams passing between
    > > networks if two network cards have been installed.
    >
    > Any knowledge whether Firewall/Packet-Filtering Products based on the
    > Windows TCP/IP stack are concerned and under what circumstances?
    >
    > thanks, hh
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:04:47 PDT