Sam Hartman <hartm...@debian.org> writes:

> I assume this goes back to squeeze as well.

The bug is as old as the file it's in.

> Shouldn't the severity be higher? This seems probably worth a DSA
> because such ping-pong attacks can really be bad for a network/server.
> Or am I missing mittigations?
> I'd be happy to work on packages.

Some limited testing indicates that when the packet storm is confined
to a single host, legitimate kpasswd and kadm5 requests can still get
through, and the CPU usage pegs at about 70%.  I haven't tested with
multiple hosts involved.

Mitigations include blocking specific source ports on inbound UDP
packets.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to