PF in OpenBSD 3.0 with the return-rst rule sets the TTL to 128 in the RST packet, which allows remote attackers to determine if a port is being filtered because the TTL is different than the default TTL.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/4401 | vendor advisory exploit vdb entry third party advisory broken link |
http://www.securityfocus.com/archive/1/265188 | mailing list vendor advisory vdb entry third party advisory broken link |
http://www.iss.net/security_center/static/8738.php | vdb entry broken link vendor advisory |