Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 24 Oct 1998 12:07:47 +0930 (CST)
From:      Kris Kennaway <kkennawa@physics.adelaide.edu.au>
To:        current@FreeBSD.ORG
Subject:   nestea v2 against freebsd 3.0-Release (fwd)
Message-ID:  <Pine.OSF.4.05.9810241203460.76-100000@mercury.physics.adelaide.edu.au>

next in thread | raw e-mail | index | archive | help
I tested this against myself this morning and it panicked the machine - I had
to run as root to hit the 127.0.0.1 target, but perhaps someone could confirm
whether it works against remote machines?

This is obviously not good to have amajor vulnerability in 3.0 known before it
even ships out the door :-(

Kris

---------- Forwarded message ----------
Date: Fri, 23 Oct 1998 09:41:23 +0200
From: Gilles Bruno <Gilles.Bruno@ujf-grenoble.fr>
To: freebsd-security@freebsd.org
Subject: nestea v2 against freebsd 3.0-Release

Hi everyone, 
we tested yesterday the old nestea v2 against a brand new
3.0-Release : it has prooved to be effective against it
(the box rebooted - invalid page fault while in kernel
mode). The same test against 2.2.[6,7]-Release didn't harm
at all.

Am I missing something ? some sysctl ? a special kernel config ?

Let us know...



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.OSF.4.05.9810241203460.76-100000>