Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 30 Apr 2014 10:21:07 +0200
From:      Thomas Steen Rasmussen <thomas@gibfest.dk>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-14:08.tcp
Message-ID:  <5360B273.102@gibfest.dk>
In-Reply-To: <201404300435.s3U4ZAw1093717@freefall.freebsd.org>
References:  <201404300435.s3U4ZAw1093717@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On 30-04-2014 06:35, FreeBSD Security Advisories wrote:
> =============================================================================
> FreeBSD-SA-14:08.tcp                                        Security Advisory
>                                                           The FreeBSD Project
> 
> Topic:          TCP reassembly vulnerability
> 

Hello everyone,

Does anyone have a PoC exploit for this ? I want to see what we can do
in IPS and so on at $work to protect against this until the patches can
be applied.

Thanks!


/Thomas



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5360B273.102>