Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 17 Aug 1999 18:23:25 -0600
From:      Brett Glass <brett@lariat.org>
To:        Matthew Dillon <dillon@apollo.backplane.com>, Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Any work around for this FreeBSD bug/DoS  ?
Message-ID:  <4.2.0.58.19990817182156.0463ecd0@localhost>
In-Reply-To: <199908170527.WAA13380@apollo.backplane.com>
References:  <4.1.19990816203409.05989960@granite.sentex.ca> <4.1.19990816213403.05a3b540@granite.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
At 10:27 PM 8/16/99 -0700, Matthew Dillon wrote:


>     There are many ways a user can crash the system... eating network mbufs
>     isn't the easiest.  My experience is that as long as you cover most of
>     the bases, the few that remain will not cause enough of a problem to
>     become endemic.  Crashing a machine through a user account is not 
>     really satisfactory to most hackers since it is so easy to do -- and
>     also relatively easy to trace.

Perhaps. But this is no excuse for leaving such a serious hole open! No 
unprivileged user should be able to crash the system under any circumstances.
Especially not this easily.

--Brett


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.19990817182156.0463ecd0>