nanog mailing list archives
Re: Spectre/Meltdown impact on network devices
From: Saku Ytti <saku () ytti fi>
Date: Mon, 8 Jan 2018 13:30:44 +0200
On 8 January 2018 at 12:41, Stephane Bortzmeyer <bortzmeyer () nic fr> wrote:
the best solution, for the attacker, is probably to exploit a bug in the BGP parser (as we have seen with attribute 99, BGP parsers have bugs): with a buffer overflow, you may be able to run code you choose. Purely theoretical at this stage, I didn't try.
BGP runs as a privileged user, if you're already executing code as BGP, why do you need Spectre or Meltdown? Just read the memory you're interested in, or setup port mirror, or reroute traffic. -- ++ytti
Current thread:
- Spectre/Meltdown impact on network devices Jean | ddostest.me via NANOG (Jan 07)
- Re: Spectre/Meltdown impact on network devices Josh Reynolds (Jan 07)
- Re: Spectre/Meltdown impact on network devices William Herrin (Jan 07)
- Re: Spectre/Meltdown impact on network devices Masataka Ohta (Jan 07)
- Re: Spectre/Meltdown impact on network devices William Herrin (Jan 07)
- Message not available
- Re: Spectre/Meltdown impact on network devices Masataka Ohta (Jan 08)
- Re: Spectre/Meltdown impact on network devices Masataka Ohta (Jan 07)
- Re: Spectre/Meltdown impact on network devices Denys Fedoryshchenko (Jan 07)
- Re: Spectre/Meltdown impact on network devices Stephane Bortzmeyer (Jan 08)
- Re: Spectre/Meltdown impact on network devices Saku Ytti (Jan 08)
- Re: Spectre/Meltdown impact on network devices Stephane Bortzmeyer (Jan 08)
- Re: Spectre/Meltdown impact on network devices James Bensley (Jan 08)