Core Internet Technology vulnerable to hacking

Natoma

Veteran
Researchers found a serious security flaw that left core Internet technology vulnerable to hackers, prompting a secretive effort by international governments and industry experts in recent weeks to prevent global disruptions of Web surfing, e-mails and instant messages.

Experts said the flaw, disclosed Tuesday by the British government, affects the underlying technology for nearly all Internet traffic. Left unaddressed, they said, it could allow hackers to knock computers offline and broadly disrupt vital traffic-directing devices, called routers, that coordinate the flow of data among distant groups of computers.

"Exploitation of this vulnerability could have affected the glue that holds the Internet together," said Roger Cumming, director for England's National Infrastructure Security Coordination Centre.

The flaw affecting the Internet's "tranmission control protocol," or TCP, was discovered late last year by a computer researcher in Milwaukee, Paul "Tony" Watson, 36, who said he identified a method to reliably trick personal computers and routers into shutting down electronic conversations by resetting the machines remotely.

Routers continually exchange important updates about the most efficient traffic routes between large networks. Continued successful attacks against routers can cause them to go into a stand-by mode, known as "dampening," that can persist for hours.

Experts previously maintained such attacks could take between four years and 142 years to succeed because they require guessing a rotating number from roughly 4 billion possible combinations. Watson said he can guess the proper number with as few as four attempts, which can be accomplished within seconds.

"The biggest concern is (the effect on routers) because of the risk of bringing down the Internet or severely disrupting traffic on the Internet," Watson said.

Already in recent weeks, some U.S. government agencies and companies operating the most important digital pipelines have quietly fortified their own vulnerable systems because of early warnings communicated by some security organizations. The White House has expressed concerns especially about risks to crucial Internet routers, since attacks against them could profoundly disrupt online traffic.

"Any flaw to a fundamental protocol would raise significant concern and require significant attention by the folks who run the major infrastructures of the Internet," said Amit Yoran, the U.S. government's cybersecurity chief. The new flaw has dominated discussions since last week among experts in close-knit security circles.

The public announcement coincides with a presentation Watson expects to make Thursday at a popular Internet security conference in Vancouver, where Watson said he will reveal full details of his research.

Watson, who runs the www.terrorist.net Web site, predicted that hackers will understand how to begin launching attacks "within five minutes of walking out of that meeting."

"It's fairly easy to implement," Watson said. "Someone walking out of the conference would immediately understand. No matter how vague I am, people will figure it out."

http://www.salon.com/tech/wire/2004/04/20/internet/
 
Sounds like real crap to me. And why do they mention TCP and then talk about routing protocols?
 
TCP has nothing to do with routing. IP does.

But, I'm willing to forgive the reporter for not getting the facts quite right.
 
This is not the first time router vulnerability has been under scrutiny.

Even high end routers are subject to denial of service attacks because some only hardwire route tables for the 99.99% common case and handles the rest as exceptions in software.

Send a large amount of small IP packets with these "rare" IP numbers through the router causes is to crawl.

Cheers
Gubbi
 
www.cisco.com said:
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered by an external researcher. The successful exploitation enables an adversary to reset any established TCP connection in a much shorter time than was previously discussed publicly...
And
Cisco Internetwork Operating System (IOS) Software releases trains 12.0S, 12.1E, 12.2, 12.2S, 12.3, 12.3B and 12.3T may contain a vulnerability in processing SNMP requests which, if exploited, could cause the device to reload.

...

This vulnerability can be remotely triggered. A successful exploitation of this vulnerability may cause a reload of the device and could be exploited repeatedly to produce a Denial of Service (DoS).
Source
 
Back
Top