Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Jun 2000 17:47:06 +0100
From:      User Datagram Protocol <udp@closed-networks.com>
To:        freebsd-security@freebsd.org, Ussr Labs <labs@USSRBACK.COM>
Subject:   Re: Local FreeBSD, Openbsd, NetBSD, DoS Vulnerability - Mac OS X affected
Message-ID:  <20000614174706.F78775@closed-networks.com>
In-Reply-To: <NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs@ussrback.com>; from labs@USSRBACK.COM on Wed, Aug 02, 2000 at 08:41:53AM -0300
References:  <NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs@ussrback.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Eww. What a lame DoS attack.

On Wed, Aug 02, 2000 at 08:41:53AM -0300, Ussr Labs wrote:
> an unpriviledged user can panic the kernel. Quick and dirty testing
> 
...

Big deal. So what do we do about it? Implement per-process mbuf usage limits?
Eww.

-- 
Bruce M. Simpson aka 'udp'       Security Analyst & UNIX Development Engineer
                                            WWW: www.closed-networks.com/~udp 
Dundee                                             www.packetfactory.net/~udp
United Kingdom                            email:      udp@closed-networks.com


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000614174706.F78775>