Date: Thu, 3 Sep 1998 23:37:25 +0200 (CEST) From: Mikael Karpberg <karpen@ocean.campus.luth.se> To: Studded@dal.net (Studded) Cc: freebsd-hackers@FreeBSD.ORG Subject: Re: Response to RST validation problem? Message-ID: <199809032137.XAA14593@ocean.campus.luth.se> In-Reply-To: <35EEE839.D3169E59@dal.net> from Studded at "Sep 3, 98 12:04:25 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
According to Studded: > As I'm sure everyone is aware, there was a post on bugtraq Sunday > regarding a vulnerability in our TCP code which leaves the system open > to attack via RST packets. In the past the project has always responded Umm... For those of us that don't have time to read Yet Another Mailing List and are therefor not subscribed to bugtraq... What is the effect of this attack? I assume you can send some form of packet to the a FreeBSD machine from a remote computer and get something to happen. What? Crash, DoS, or rootprompt? Personally I'm not too worried if it's not the latter. I'll just reboot my server is something happens. :-) I'll upgrade when there is a patch... But if there's a breakin bug I kinda need to stop it. /Mikael To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199809032137.XAA14593>