Date: 17 Aug 1998 18:30:58 +0200 From: dag-erli@ifi.uio.no (Dag-Erling Coidan =?iso-8859-1?Q?Sm=F8rgrav?= ) To: Brett Glass <brett@lariat.org> Cc: 026809r@dragon.acadiau.ca (Michael Richards), security@FreeBSD.ORG Subject: Re: Why don't winblows program have buffer overruns? Message-ID: <xzpww87tvst.fsf@hrotti.ifi.uio.no> In-Reply-To: Brett Glass's message of "Sun, 16 Aug 1998 20:36:30 -0600" References: <199808170244.UAA18362@lariat.lariat.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Brett Glass <brett@lariat.org> writes: > You can still confuse them and possibly crash > them via things like Winnuke (a program which exploits a flaw in Windows' > built-in NetBIOS over TCP/IP implementation). This is getting off-topic, but the bug is in the TCP/IP stack, not the NetBIOS code. The only reason WinNuke uses port 139 (the netbios-ssn port) is that you're pretty sure there'll be someone listening there. I've seen WinNuke scripts modified to use port 80 to attack Windows- based Web servers through firewalls that blocked NetBIOS traffic. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpww87tvst.fsf>