COMMAND

    rp-pppoe

SYSTEMS AFFECTED

    rp-pppoe versions <= 2.4

PROBLEM

    Robert Schlabbach found  following.   There is a denial-of-service
    vulnerability  in  rp-pppoe  versions  up  to  2.4.  rp-pppoe is a
    user-space PPPoE client for a  bunch of UNIXes and Linux,  used by
    many residential ADSL customers.

    If you use the "Clamp MSS" option and someone crafts a TCP  packet
    with an  (illegal) "zero-length"  option, rp-pppoe  will fall into
    an endless loop.  Eventually,  the PPP daemon should time  out and
    kill the connection.

SOLUTION

    Upgrade to rp-pppoe 2.5 at

        http://www.roaringpenguin.com/pppoe/

    If you cannot upgrade quickly,  do not use the "Clamp  MSS" option
    until you can upgrade.

    For Linux-Mandrake:

        Linux-Mandrake 7.1: 7.1/RPMS/rp-pppoe-2.5-2.1mdk.i586.rpm
                            7.1/SRPMS/rp-pppoe-2.5-2.1mdk.src.rpm
        Linux-Mandrake 7.2: 7.2/RPMS/rp-pppoe-2.5-2.2mdk.i586.rpm
                            7.2/SRPMS/rp-pppoe-2.5-2.2mdk.src.rpm

    For Red Hat:

        ftp://updates.redhat.com/7.0/alpha/rp-pppoe-2.5-1.alpha.rpm
        ftp://updates.redhat.com/7.0/i386/rp-pppoe-2.5-1.i386.rpm
        ftp://updates.redhat.com/7.0/SRPMS/rp-pppoe-2.5-1.src.rpm

    For Conectiva Linux:

        ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/rp-pppoe-2.5-1cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/6.0/RPMS/rp-pppoe-2.5-1cl.i386.rpm