Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jan 2000 17:34:26 -0700
From:      Warner Losh <imp@village.org>
To:        Brett Glass <brett@lariat.org>
Cc:        jamiE rishaw - master e*tard <jamiE@arpa.com>, Tom <tom@uniserve.com>, Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG, freebsd-stable@FreeBSD.ORG, security-officer@FreeBSD.ORG
Subject:   Re: bugtraq posts: stream.c - new FreeBSD exploit? 
Message-ID:  <200001210034.RAA06762@harmony.village.org>
In-Reply-To: Your message of "Thu, 20 Jan 2000 17:32:03 MST." <4.2.2.20000120172607.0198f1e0@localhost> 
References:  <4.2.2.20000120172607.0198f1e0@localhost>  <Pine.BSF.4.02A.10001201232520.26367-100000@shell.uniserve.ca> <3.0.5.32.20000120152818.01d7fa40@staff.sentex.ca> <Pine.BSF.4.02A.10001201232520.26367-100000@shell.uniserve.ca> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <4.2.2.20000120172607.0198f1e0@localhost> Brett Glass writes:
: The name "stream.c" makes it sound like a local, not remote, DoS. Does
: it have to be done from inside the system to be effective? I would think
: that, if it came from the outside, it'd be harder to saturate the
: victim. 

It is a remote exploit.

Warner


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001210034.RAA06762>