Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jan 2000 17:40:11 -0700
From:      Brett Glass <brett@lariat.org>
To:        Warner Losh <imp@village.org>
Cc:        jamiE rishaw - master e*tard <jamiE@arpa.com>, Tom <tom@uniserve.com>, Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG, freebsd-stable@FreeBSD.ORG, security-officer@FreeBSD.ORG
Subject:   Re: bugtraq posts: stream.c - new FreeBSD exploit? 
Message-ID:  <4.2.2.20000120173905.01882570@localhost>

next in thread | raw e-mail | index | archive | help
That means that the code path that validates the ACK in the kernel
must be long. Long enough so that you can hose the CPU over, say,
a T1. How does one short-circuit this?

--Brett

At 05:34 PM 1/20/2000 , Warner Losh wrote:
   
>It is a remote exploit.
>
>Warner



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20000120173905.01882570>