From owner-freebsd-bugs Thu Nov 20 20:24:02 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id UAA10408 for bugs-outgoing; Thu, 20 Nov 1997 20:24:02 -0800 (PST) (envelope-from owner-freebsd-bugs) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id UAA10379; Thu, 20 Nov 1997 20:23:44 -0800 (PST) (envelope-from jkh@FreeBSD.org) From: "Jordan K. Hubbard" Received: (from jkh@localhost) by freefall.freebsd.org (8.8.6/8.8.5) id UAA16322; Thu, 20 Nov 1997 20:23:30 -0800 (PST) Date: Thu, 20 Nov 1997 20:23:30 -0800 (PST) Message-Id: <199711210423.UAA16322@freefall.freebsd.org> To: jkh@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG, security-officer@FreeBSD.ORG Subject: Re: kern/5103 Sender: owner-freebsd-bugs@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Synopsis: It appears to be possible to lockup a FreeBSD box with a spoofed TCP packet. Two of our shell machines were attacked tonight. Responsible-Changed-From-To: freebsd-bugs->security-officer Responsible-Changed-By: jkh Responsible-Changed-When: Thu Nov 20 20:23:02 PST 1997 Responsible-Changed-Why: The security officer should own this one until resolution.