From owner-freebsd-security Tue Jun 11 01:26:34 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id BAA13237 for security-outgoing; Tue, 11 Jun 1996 01:26:34 -0700 (PDT) Received: from silvia.HIP.Berkeley.EDU (silvia.HIP.Berkeley.EDU [136.152.64.181]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id BAA13229 for ; Tue, 11 Jun 1996 01:26:28 -0700 (PDT) Received: (from asami@localhost) by silvia.HIP.Berkeley.EDU (8.7.5/8.6.9) id BAA13388; Tue, 11 Jun 1996 01:26:26 -0700 (PDT) Date: Tue, 11 Jun 1996 01:26:26 -0700 (PDT) Message-Id: <199606110826.BAA13388@silvia.HIP.Berkeley.EDU> To: security@freebsd.org Subject: ftp bomb From: asami@cs.berkeley.edu (Satoshi Asami) Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I've read on a mailing list that it's possible to run a script to bomb any host by using the PORT command of ftpd. I won't quote the original e-mail (it's in Japanese), but FreeBSD was mentioned as one of the vulnerable platforms. Satoshi