As outlined in https://kb.cert.org/vuls/id/347067, there is an attack that uses 
specially crafted Path Attributes in a BGP UPDATE message to disrupt peering 
sessions. I don’t recall seeing any discussions of this attack on this list. Is 
BIRD susceptible?

Thanks,
Michael


Reply via email to