[GTER] Mikrotik IPv6 remote crash attack

Eduardo Rigler erigler at gmail.com
Sun Apr 7 21:11:18 -03 2019


https://gbhackers.com/mikrotik-routeros-vulnerability/amp/

Em sáb, 6 de abr de 2019 19:08, Eduardo Rigler <erigler at gmail.com> escreveu:

>
> Release 6.44.2 2019-04-04
>
> What's new in 6.44.2 (2019-Apr-01 12:47):
>
> MAJOR CHANGES IN v6.44.2:
> ----------------------
> !) ipv6 - fixed soft lockup when forwarding IPv6 packets;
> !) ipv6 - fixed soft lockup when processing large IPv6 Neighbor table;
> ----------------------
>
> Changes in this release:
>
> *) ipv6 - adjust IPv6 route cache max size based on total RAM memory;
>
>
> Resolveram, afinal?
>
> Em qui, 4 de abr de 2019 às 23:17, Rubens Kuhl <rubensk at gmail.com>
> escreveu:
>
>> On Wed, Apr 3, 2019 at 10:19 AM Douglas Fischer <fischerdouglas at gmail.com
>> >
>> wrote:
>>
>> > Mano, será que fizeram essa marretada de chumbar uma limitação de RAM?
>> >
>> > Se for isso mesmo, qual seria a classificação para uma solução assim?
>> >
>> >
>> > E se o cara resolver rodar só IPv6 numa CCR?
>> > Isso é proibido? hahaha
>> >
>> >
>>
>> Você propor um patch diferente...
>> https://github.com/robimarko/routeros-GPL
>>
>>
>> Rubens
>> --
>> gter list    https://eng.registro.br/mailman/listinfo/gter
>>
>



More information about the gter mailing list