Date: Wed, 30 Apr 2014 10:21:07 +0200 From: Thomas Steen Rasmussen <thomas@gibfest.dk> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:08.tcp Message-ID: <5360B273.102@gibfest.dk> In-Reply-To: <201404300435.s3U4ZAw1093717@freefall.freebsd.org> References: <201404300435.s3U4ZAw1093717@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 30-04-2014 06:35, FreeBSD Security Advisories wrote: > ============================================================================= > FreeBSD-SA-14:08.tcp Security Advisory > The FreeBSD Project > > Topic: TCP reassembly vulnerability > Hello everyone, Does anyone have a PoC exploit for this ? I want to see what we can do in IPS and so on at $work to protect against this until the patches can be applied. Thanks! /Thomas
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5360B273.102>