nanog mailing list archives

Re: Spectre/Meltdown impact on network devices


From: Saku Ytti <saku () ytti fi>
Date: Mon, 8 Jan 2018 13:30:44 +0200

On 8 January 2018 at 12:41, Stephane Bortzmeyer <bortzmeyer () nic fr> wrote:

the best solution, for the attacker, is probably to exploit a bug in
the BGP parser (as we have seen with attribute 99, BGP parsers have
bugs): with a buffer overflow, you may be able to run code you
choose. Purely theoretical at this stage, I didn't try.

BGP runs as a privileged user, if you're already executing code as
BGP, why do you need Spectre or Meltdown? Just read the memory you're
interested in, or setup port mirror, or reroute traffic.

-- 
  ++ytti


Current thread: