Date: Tue, 17 Aug 1999 18:23:25 -0600 From: Brett Glass <brett@lariat.org> To: Matthew Dillon <dillon@apollo.backplane.com>, Mike Tancsa <mike@sentex.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Any work around for this FreeBSD bug/DoS ? Message-ID: <4.2.0.58.19990817182156.0463ecd0@localhost> In-Reply-To: <199908170527.WAA13380@apollo.backplane.com> References: <4.1.19990816203409.05989960@granite.sentex.ca> <4.1.19990816213403.05a3b540@granite.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
At 10:27 PM 8/16/99 -0700, Matthew Dillon wrote: > There are many ways a user can crash the system... eating network mbufs > isn't the easiest. My experience is that as long as you cover most of > the bases, the few that remain will not cause enough of a problem to > become endemic. Crashing a machine through a user account is not > really satisfactory to most hackers since it is so easy to do -- and > also relatively easy to trace. Perhaps. But this is no excuse for leaving such a serious hole open! No unprivileged user should be able to crash the system under any circumstances. Especially not this easily. --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.19990817182156.0463ecd0>