Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 24 Jun 2000 15:11:59 -0400
From:      Nick Evans <nevans@nextvenue.com>
To:        "'Herbert J. McNew'" <herb@cais.net>
Cc:        "'freebsd-security@freebsd.org'" <freebsd-security@freebsd.org>
Subject:   RE: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options
Message-ID:  <712384017032D411AD7B0001023D799B07C8D7@SN1EXCHMBX>

next in thread | raw e-mail | index | archive | help
This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01BFDE10.122634C0
Content-Type: text/plain;
	charset="iso-8859-1"

You might be able to use Nemesis to regenerate these types of packets:

http://celerity.bartoli.org/nemesis/

Nick

-----Original Message-----
From: Herbert J. McNew [mailto:herb@cais.net]
Sent: Friday, June 23, 2000 12:39 PM
To: security@FreeBSD.ORG
Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options


Maybe I missed it, but does anyone have an exploit for this yet?  I have a
solution (that isn's a kernel recompile) that I'd like to test, but have
no way of doing so without an exploit.

Thanks.

_____________________ 
Herb McNew
Systems Administrator
CAIS Internet
(703) 247-6270
herb@cais.net




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message

------_=_NextPart_001_01BFDE10.122634C0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2652.35">
<TITLE>RE: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2>You might be able to use Nemesis to regenerate these types of packets:</FONT>
</P>

<P><FONT SIZE=2><A HREF="http://celerity.bartoli.org/nemesis/" TARGET="_blank">http://celerity.bartoli.org/nemesis/</A></FONT>;
</P>

<P><FONT SIZE=2>Nick</FONT>
</P>

<P><FONT SIZE=2>-----Original Message-----</FONT>
<BR><FONT SIZE=2>From: Herbert J. McNew [<A HREF="mailto:herb@cais.net">mailto:herb@cais.net</A>]</FONT>
<BR><FONT SIZE=2>Sent: Friday, June 23, 2000 12:39 PM</FONT>
<BR><FONT SIZE=2>To: security@FreeBSD.ORG</FONT>
<BR><FONT SIZE=2>Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-00:23.ip-options</FONT>
</P>
<BR>

<P><FONT SIZE=2>Maybe I missed it, but does anyone have an exploit for this yet?&nbsp; I have a</FONT>
<BR><FONT SIZE=2>solution (that isn's a kernel recompile) that I'd like to test, but have</FONT>
<BR><FONT SIZE=2>no way of doing so without an exploit.</FONT>
</P>

<P><FONT SIZE=2>Thanks.</FONT>
</P>

<P><FONT SIZE=2>_____________________ </FONT>
<BR><FONT SIZE=2>Herb McNew</FONT>
<BR><FONT SIZE=2>Systems Administrator</FONT>
<BR><FONT SIZE=2>CAIS Internet</FONT>
<BR><FONT SIZE=2>(703) 247-6270</FONT>
<BR><FONT SIZE=2>herb@cais.net</FONT>
</P>
<BR>
<BR>
<BR>

<P><FONT SIZE=2>To Unsubscribe: send mail to majordomo@FreeBSD.org</FONT>
<BR><FONT SIZE=2>with &quot;unsubscribe freebsd-security&quot; in the body of the message</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01BFDE10.122634C0--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?712384017032D411AD7B0001023D799B07C8D7>