[GTER] Mikrotik IPv6 remote crash attack
Uesley Correa
uesleycorrea at gmail.com
Mon Apr 1 08:26:03 -03 2019
Opaaa Rubens!
Confio ou pode ser primeiro de abril?
Saudações,
Uesley Corrêa
On Mon, Apr 1, 2019, 03:40 Rubens Kuhl <rubensk at gmail.com> wrote:
> https://mikrotik.com/download/changelogs/testing-release-tree
>
> What's new in 6.45beta23 (2019-Apr-01 05:51):
>
> MAJOR CHANGES IN v6.45:
> ----------------------
> !) ipv6 - fixed soft lockup when forwarding IPv6 packets;
> !) ipv6 - fixed soft lockup when processing large IPv6 Neighbor table;
> ----------------------
>
> Changes in this release:
>
> *) ipsec - properly drop already established tunnel when address change
> detected;
> *) ipv6 - adjust IPv6 route cache max size based on total RAM memory;
> *) smb - fixed possible buffer overflow;
>
> On Thu, Mar 28, 2019 at 8:10 PM Job Snijders <job at ntt.net> wrote:
>
> > Dear all,
> >
> > Word on the streets is that there is a serious bug in Mikrotik's IPv6
> > implementation. Given the popularity of Mikrotik in the Brasil region,
> > it would perhaps be good to keep an eye on the following:
> >
> > https://forum.mikrotik.com/viewtopic.php?t=147048
> >
> > Kind regards,
> >
> > Job
> > --
> > gter list https://eng.registro.br/mailman/listinfo/gter
> >
> --
> gter list https://eng.registro.br/mailman/listinfo/gter
>
More information about the gter
mailing list