Issue metadata
Sign in to add a comment
|
Security: Chrome OS still vulnerable to SMURF
Reported by
eternalg...@gmail.com,
Mar 28 2016
|
||||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address. Most devices on a network will, by default, respond to this by sending a reply to the source IP address. If the number of machines on the network that receive and respond to these packets is very large, the victim's computer will be flooded with traffic. This can slow down the victim's computer to the point where it becomes impossible to work on. VERSION ChromeOS Version: Current Stable Operating System: ChromeOS REPRODUCTION CASE The Smurf attack works by sending an ICMP type 0 (ping) message to the broadcast address of a network. Typically the attacker will use a spoofed source address. All the computers on the network will respond to the ping message and thereby flood the host at the spoofed source address. MITIGATION This can be fixed by setting "net.ipv4.icmp_echo_ignore_broadcasts = 0" in /etc/sysctl.conf.
,
Mar 28 2016
dupping into issue 598312 where there's a lot more action.
,
Mar 28 2016
Okay, thank you for your time :D
,
Jul 5 2016
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Oct 1 2016
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Oct 2 2016
|
|||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||
Comment 1 by eternalg...@gmail.com
, Mar 28 2016