![nanog logo](/images/nanog-logo.png)
nanog mailing list archives
Re: 0day Windows Network Interception Configuration Vulnerability
From: Mikael Abrahamsson <swmike () swm pp se>
Date: Mon, 4 Apr 2011 19:46:32 +0200 (CEST)
On Mon, 4 Apr 2011, Jeroen van Ingen wrote:
a network yet. I believe this attack will work on most networks out there, simply because IPv6 is enabled on hosts and rogue RA filtering hasn't been implemented on most switches yet.
Any responsible ISP will block this kind of L2 "unknown" traffic between customers.
We see this happening unwittingly in the wild as of several years ago with Windows ICS announcing RA to both WAN and LAN because it (or thinks it) has 6to4 connectivity and wants to share it.
Nothing new here, but the wider it's known the better. -- Mikael Abrahamsson email: swmike () swm pp se
Current thread:
- 0day Windows Network Interception Configuration Vulnerability andrew.wallace (Apr 04)
- Re: 0day Windows Network Interception Configuration Vulnerability Andrew Kirch (Apr 04)
- Re: 0day Windows Network Interception Configuration Vulnerability Valdis . Kletnieks (Apr 04)
- Re: 0day Windows Network Interception Configuration Vulnerability Dan White (Apr 04)
- Re: 0day Windows Network Interception Configuration Vulnerability Jeroen van Ingen (Apr 04)
- Re: 0day Windows Network Interception Configuration Vulnerability Mikael Abrahamsson (Apr 04)
- Re: 0day Windows Network Interception Configuration Vulnerability Jeroen van Ingen (Apr 04)
- Re: 0day Windows Network Interception Configuration Vulnerability Nick Hilliard (Apr 04)
- <Possible follow-ups>
- Re: 0day Windows Network Interception Configuration Vulnerability Johnny Eriksson (Apr 04)