Date: Wed, 05 May 1999 23:45:55 +0200 From: "Michael C. Vergallen" <mvergall@double-barrel.be> To: CyberPsychotic <fygrave@tigerteam.net> Cc: freebsd-security@freebsd.org, "Michael C. Vergallen" <mvergall@mail.double-barrel.be> Subject: Re: FreeBSD 3.1 remote reboot exploit (fwd) Message-ID: <3730BC13.9EA40ED9@double-barrel.be> References: <Pine.LNX.4.05.9905051653080.452-100000@gizmo.kyrnet.kg>
next in thread | previous in thread | raw e-mail | index | archive | help
CyberPsychotic wrote: > hmm.. depends on how you did that. Assuming from the other reports people > send to the list, I believe the problem appears on tcp/ip level _maybe_ with > some specific kernel options turned on. I've played with a friend's of mine > machine bombing it with various sorts of maliformed tcp/udp and just sick ip > datagrams but wasn't able to reproduce this. If anyone expirienced the > problem wouldn't mind to share their log files/network traffic dump, I would > appreciate that. I 've been genrating packets of different sizes and only ones have I managed to lock the box up while transfering a 1 GB image file and pulling the cable to the disc-crate by accident. Michael To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3730BC13.9EA40ED9>