From owner-freebsd-security Sat Jun 24 12:16: 9 2000 Delivered-To: freebsd-security@freebsd.org Received: from sn1oexchr01.nextvenue.com (sn1oexchr01.nextvenue.com [63.209.169.9]) by hub.freebsd.org (Postfix) with SMTP id 74E4337B640 for ; Sat, 24 Jun 2000 12:15:46 -0700 (PDT) (envelope-from nevans@nextvenue.com) Received: FROM sn1exchmbx.nextvenue.com BY sn1oexchr01.nextvenue.com ; Sat Jun 24 15:12:04 2000 -0400 Received: by SN1EXCHMBX with Internet Mail Service (5.5.2650.21) id ; Sat, 24 Jun 2000 15:11:59 -0400 Message-ID: <712384017032D411AD7B0001023D799B07C8D7@SN1EXCHMBX> From: Nick Evans To: "'Herbert J. McNew'" Cc: "'freebsd-security@freebsd.org'" Subject: RE: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options Date: Sat, 24 Jun 2000 15:11:59 -0400 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2650.21) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01BFDE10.122634C0" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01BFDE10.122634C0 Content-Type: text/plain; charset="iso-8859-1" You might be able to use Nemesis to regenerate these types of packets: http://celerity.bartoli.org/nemesis/ Nick -----Original Message----- From: Herbert J. McNew [mailto:herb@cais.net] Sent: Friday, June 23, 2000 12:39 PM To: security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options Maybe I missed it, but does anyone have an exploit for this yet? I have a solution (that isn's a kernel recompile) that I'd like to test, but have no way of doing so without an exploit. Thanks. _____________________ Herb McNew Systems Administrator CAIS Internet (703) 247-6270 herb@cais.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message ------_=_NextPart_001_01BFDE10.122634C0 Content-Type: text/html; charset="iso-8859-1" RE: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options

You might be able to use Nemesis to regenerate these types of packets:

http://celerity.bartoli.org/nemesis/

Nick

-----Original Message-----
From: Herbert J. McNew [mailto:herb@cais.net]
Sent: Friday, June 23, 2000 12:39 PM
To: security@FreeBSD.ORG
Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options


Maybe I missed it, but does anyone have an exploit for this yet?  I have a
solution (that isn's a kernel recompile) that I'd like to test, but have
no way of doing so without an exploit.

Thanks.

_____________________
Herb McNew
Systems Administrator
CAIS Internet
(703) 247-6270
herb@cais.net




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message

------_=_NextPart_001_01BFDE10.122634C0-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message