Date: Thu, 20 Jan 2000 17:40:11 -0700 From: Brett Glass <brett@lariat.org> To: Warner Losh <imp@village.org> Cc: jamiE rishaw - master e*tard <jamiE@arpa.com>, Tom <tom@uniserve.com>, Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG, freebsd-stable@FreeBSD.ORG, security-officer@FreeBSD.ORG Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? Message-ID: <4.2.2.20000120173905.01882570@localhost>
next in thread | raw e-mail | index | archive | help
That means that the code path that validates the ACK in the kernel must be long. Long enough so that you can hose the CPU over, say, a T1. How does one short-circuit this? --Brett At 05:34 PM 1/20/2000 , Warner Losh wrote: >It is a remote exploit. > >Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20000120173905.01882570>