From owner-freebsd-security Mon Dec 29 20:45:06 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id UAA19933 for security-outgoing; Mon, 29 Dec 1997 20:45:06 -0800 (PST) (envelope-from owner-freebsd-security) Received: from time.cdrom.com (root@time.cdrom.com [204.216.27.226]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id UAA19928; Mon, 29 Dec 1997 20:45:02 -0800 (PST) (envelope-from jkh@time.cdrom.com) Received: from time.cdrom.com (jkh@localhost.cdrom.com [127.0.0.1]) by time.cdrom.com (8.8.8/8.6.9) with ESMTP id UAA16263; Mon, 29 Dec 1997 20:45:02 -0800 (PST) To: "UC Computer / Transbay.Net" cc: bugs@FreeBSD.ORG, isp@FreeBSD.ORG, security@FreeBSD.ORG Subject: Re: Two sources for system-cracking tools In-reply-to: Your message of "Mon, 29 Dec 1997 13:40:10 PST." <199712292140.NAA04641@transbay.net> Date: Mon, 29 Dec 1997 20:45:02 -0800 Message-ID: <16260.883457102@time.cdrom.com> From: "Jordan K. Hubbard" Sender: owner-freebsd-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > Here are two files concerning breaking into or trashing systems. One of these , > "land.c", says all versions of FreeBSD are susceptible to what it does. The > other (teardrop) may/not also work (w/w/o firewall), but should be of interes FreeBSD has been immune to LAND for some time (see the Newsflash page at http://www.freebsd.org) and was never vulnerable to teardrop at all - that was a purely Linux / Windows attack. Jordan