Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 05 May 1999 23:45:55 +0200
From:      "Michael C. Vergallen" <mvergall@double-barrel.be>
To:        CyberPsychotic <fygrave@tigerteam.net>
Cc:        freebsd-security@freebsd.org, "Michael C. Vergallen" <mvergall@mail.double-barrel.be>
Subject:   Re: FreeBSD 3.1 remote reboot exploit (fwd)
Message-ID:  <3730BC13.9EA40ED9@double-barrel.be>
References:  <Pine.LNX.4.05.9905051653080.452-100000@gizmo.kyrnet.kg>

next in thread | previous in thread | raw e-mail | index | archive | help
CyberPsychotic wrote:

> hmm.. depends on how you did that. Assuming from the other reports people
> send to the list, I believe the problem appears on tcp/ip level _maybe_ with
> some specific kernel options turned on. I've played with a friend's of mine
> machine bombing it with various sorts of maliformed tcp/udp and just sick ip
> datagrams but wasn't able to reproduce this. If anyone expirienced the
> problem wouldn't mind to share their log files/network traffic dump, I would
> appreciate that.

I 've been genrating packets of different sizes and only ones have I managed to

lock the box up while transfering a 1 GB image file and pulling the cable  to
the
disc-crate by accident.

Michael




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3730BC13.9EA40ED9>