In a nutshell, it's a memory exhaustion issue. You send a v6 packet formed in a certain way (which I assume will be revealed on 9th April) to a Mikrotik router and the kernel leaks a bit of memory. When memory runs out the router crashes, I assume until the watchdog reboots it. There is no way to firewall as whatever this characteristic is that causes the problem can be set with any v6 packet.This is also a new one for me...will be digging into it
I believe that thread refers to CVE-2018-19298 which is a similar incident. The later one (CVE-2018-19299) is far more sinister.Something similar (if not the same)had been already discussedin this forum.
That is exactly what we are all hoping for. Unfortunately the silence from Mikrotik does not fill me with confidence that they even understand how bad this problem could turn out.Let's hope MikroTik can have a build ready with a fix before the full details of this go public...
If this is true, then WTF are they even thinking?!Mikrotik have known about this for a year and have done nothing to fix it.
In this thread there two issues listed: nd cache & routing / stateful connection exhaustion. Which is is referred here?Something similar (if not the same)had been already discussedin this forum.
/ipv6 export file=hahahanoipv6foryou.rsc /system package disable [find name=ipv6] /system reboot
Guess we won't be deploying IPv6 Q2 2019Thankfully I'm in the position to do the above (and just have on my edge routers, in fact). I am nothing short of apoplectic that I've had to, however. Secretly hoping that either 6.44.1 was a fix for this or that it's a complete hoax. Either is better than what appears to be reality.Code:Select all/ipv6 export file=hahahanoipv6foryou.rsc /system package disable [find name=ipv6] /system reboot
Edit: It really is about time v6 stops being such a second-class citizen on RouterOS. I'm a proper advocate for it but when MikroTik pull this kind of stunt it makes you start questioning your decisions.
Thanks for infoYes, really, it's that serious!
shock for meMikrotik have known about this for a year and have done nothing to fix it.
definately agree事实仍然有问题。叙述,响应e and criticism over this issue has gotten way ahead of the information available. Specially crafted packet / memory exhaustion issues (or any other vulnerability) are nothing new to even the largest network equipment manufacturers. They can be dealt with, and are done so routinely.
The common practice to go public with a vulnerability is to do it in coordination with affected vendor, and their release of a fix. To do otherwise is irresponsible and unprofessional.
If vendor knows about it for over a year and do nothing?The common practice to go public with a vulnerability is to do it in coordination with affected vendor, and their release of a fix. To do otherwise is irresponsible and unprofessional.
My slide deck for UKNOF 43 includes screenshots of me crashing 6.44.1.Thankfully I'm in the position to do the above (and just have on my edge routers, in fact). I am nothing short of apoplectic that I've had to, however. Secretly hoping that either 6.44.1 was a fix for this or that it's a complete hoax. Either is better than what appears to be reality.
Edit: It really is about time v6 stops being such a second-class citizen on RouterOS. I'm a proper advocate for it but when MikroTik pull this kind of stunt it makes you start questioning your decisions.
I have been asking MikroTik for exactly this approach for nearly a year. They will not commit to a date, or even that they have begun work on it. The timeline will be made clear in my talk at UKNOF 43 — which MikroTik were made aware of well in advance.The common practice to go public with a vulnerability is to do it in coordination with affected vendor, and their release of a fix. To do otherwise is irresponsible and unprofessional.
这就是security researchers do. Any internet connected device and protocol is studied for such bugs, and finding and fixing them makes everyone safer. Be happy that he found it before the bad guys did. Imagine someone constantly crashing your network and your firewall can't seem to do anything to stop it. They demand $5000 in bitcoin to stop the attack, no one knows how it's happening and Mikrotik can't help so you have to pay before you lose all your customers...why r u being so disruptive and trying to break mikrotik?
Very well said R1CH!这就是security researchers do. Any internet connected device and protocol is studied for such bugs, and finding and fixing them makes everyone safer. Be happy that he found it before the bad guys did. Imagine someone constantly crashing your network and your firewall can't seem to do anything to stop it. They demand $5000 in bitcoin to stop the attack, no one knows how it's happening and Mikrotik can't help so you have to pay before you lose all your customers...
The issue was disclosed privately to Mikrotik 50 weeks ago. It should have been fixed 49 weeks ago, but it seems Mikrotik doesn't prioritize vulnerabilities until they are actively exploited, so here we are.
Multiple MikroTik staff have repeatedly and continuously called this a "bug" and not a "vulnerability". If reporting "bugs" is now deemed disruptive then could someone please stop the world, because I would like to get off.why r u being so disruptive and trying to break mikrotik?