COMMAND
rp-pppoe
SYSTEMS AFFECTED
rp-pppoe versions <= 2.4
PROBLEM
Robert Schlabbach found following. There is a denial-of-service
vulnerability in rp-pppoe versions up to 2.4. rp-pppoe is a
user-space PPPoE client for a bunch of UNIXes and Linux, used by
many residential ADSL customers.
If you use the "Clamp MSS" option and someone crafts a TCP packet
with an (illegal) "zero-length" option, rp-pppoe will fall into
an endless loop. Eventually, the PPP daemon should time out and
kill the connection.
SOLUTION
Upgrade to rp-pppoe 2.5 at
http://www.roaringpenguin.com/pppoe/
If you cannot upgrade quickly, do not use the "Clamp MSS" option
until you can upgrade.
For Linux-Mandrake:
Linux-Mandrake 7.1: 7.1/RPMS/rp-pppoe-2.5-2.1mdk.i586.rpm
7.1/SRPMS/rp-pppoe-2.5-2.1mdk.src.rpm
Linux-Mandrake 7.2: 7.2/RPMS/rp-pppoe-2.5-2.2mdk.i586.rpm
7.2/SRPMS/rp-pppoe-2.5-2.2mdk.src.rpm
For Red Hat:
ftp://updates.redhat.com/7.0/alpha/rp-pppoe-2.5-1.alpha.rpm
ftp://updates.redhat.com/7.0/i386/rp-pppoe-2.5-1.i386.rpm
ftp://updates.redhat.com/7.0/SRPMS/rp-pppoe-2.5-1.src.rpm
For Conectiva Linux:
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/rp-pppoe-2.5-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/rp-pppoe-2.5-1cl.i386.rpm