Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

TCP:OPTERR:ZERO-LENGTH

Severity

Critical

Recommended

No

Recommended Action

Drop Packet

Category

TCP

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

TCP: Zero Option Length


This protocol anomaly triggers when it detects an option with a specified length of zero (which is invalid). Because this can be an attempt to force a vulnerable TCP stack into an infinite loop, it is recommended to drop these packets.

Extended Description

Roaring Penguin Software's PPPoE is a freeware PPP over Ethernet client often used by ADSL subscribers running Linux or NetBSD. PPPoE contains a possibly remotely exploitable denial of service vulnerability in its handling of TCP packets when the Clamp_MSS option is used. If PPPoE recieves a malformed TCP packet with a "zero-length option", PPPoE will go into an infinite loop. As a result, the ppp connection being supported by PPPoE will time out and be terminated. A manual re-start is needed to regain functionality. This bug has been fixed by Roaring Penguin Software in a new version, see the solutions section.

Affected Products

  • Red_hat linux 7.0.0
  • Roaring_penguin_software pppoe 2.0.0
  • Roaring_penguin_software pppoe 2.1.0
  • Roaring_penguin_software pppoe 2.2.0
  • Roaring_penguin_software pppoe 2.3.0
  • Roaring_penguin_software pppoe 2.4.0

References

  • BugTraq: 2098
  • CVE: CVE-2001-0026

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out