From owner-freebsd-security Wed Jun 14 9:39:25 2000 Delivered-To: freebsd-security@freebsd.org Received: from closed-networks.com (closed-networks.com [195.153.248.242]) by hub.freebsd.org (Postfix) with SMTP id 746C337C001 for ; Wed, 14 Jun 2000 09:39:21 -0700 (PDT) (envelope-from udp@closed-networks.com) Received: (qmail 23212 invoked by uid 1021); 14 Jun 2000 16:47:06 -0000 Mail-Followup-To: freebsd-security@freebsd.org, labs@USSRBACK.COM Date: Wed, 14 Jun 2000 17:47:06 +0100 From: User Datagram Protocol To: freebsd-security@freebsd.org, Ussr Labs Subject: Re: Local FreeBSD, Openbsd, NetBSD, DoS Vulnerability - Mac OS X affected Message-ID: <20000614174706.F78775@closed-networks.com> Reply-To: User Datagram Protocol References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0.1i In-Reply-To: ; from labs@USSRBACK.COM on Wed, Aug 02, 2000 at 08:41:53AM -0300 X-Echelon: MI6 Cobra GCHQ Panavia MI5 Timberline IRA NSA Mossad CIA Copperhead Organization: Closed Networks Limited, London, UK Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Eww. What a lame DoS attack. On Wed, Aug 02, 2000 at 08:41:53AM -0300, Ussr Labs wrote: > an unpriviledged user can panic the kernel. Quick and dirty testing > ... Big deal. So what do we do about it? Implement per-process mbuf usage limits? Eww. -- Bruce M. Simpson aka 'udp' Security Analyst & UNIX Development Engineer WWW: www.closed-networks.com/~udp Dundee www.packetfactory.net/~udp United Kingdom email: udp@closed-networks.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message