Date: Sat, 29 Nov 1997 12:15:24 -0800 (PST) From: Alex <garbanzo@hooked.net> To: Tom <tom@sdf.com> Cc: "Daniel J. O'Connor" <darius@senet.com.au>, Daniel Leeds <dleeds@dfacades.com>, hackers@freebsd.org Subject: Re: land patch? Message-ID: <Pine.BSF.3.96.971129121441.25509A-100000@zippy.dyn.ml.org> In-Reply-To: <Pine.BSF.3.95q.971129093802.4819A-100000@misery.sdf.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 29 Nov 1997, Tom wrote: > > According to someone on BugTraq, a bug was "fixed" with the tcp-stack > > after 2.2.2, that makes 2.2.5 machines vunerable to these attacks. > > Patches should have already been checked into the source tree, and can be > > retreived via cvsup or ctm (see the handbook > > http://www.freebsd.org/handbook). > > However, it is very unclear what the effect of the this bug was. land.c > certainly doesn't seem to hang FreeBSD, but it does mess with the stack a > bit. Using tcpdump on an old FreeBSD system, the land.c seems to cause > a packet to repeat over and over again. It seems to eat up some CPU, and > some buffer space. That's probably what the bug is. Afterall spiking cpu loads could be considered a DoS attack, especially if you send hundreds of them to a ocmputer. - alex
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.971129121441.25509A-100000>