[11374] in bugtraq
Re: 3com hiperarch flaw [hiperbomb.c]
daemon@ATHENA.MIT.EDU (synFlood)
Mon Aug 16 16:13:01 1999
Mail-Followup-To: BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <19990814020110.A1549@endor.sick.cl>
Date:         Sat, 14 Aug 1999 02:01:10 -0400
Reply-To: synFlood <synflood@ENDOR.SICK.CL>
From: synFlood <synflood@ENDOR.SICK.CL>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.9908121800200.27775-200000@noc.1st.net>; from
              Jonathan Chapman on Thu, Aug 12, 1999 at 06:10:44PM -0400
On Thu, Aug 12, 1999 at 06:10:44PM -0400, Jonathan Chapman wrote:
> The attached program will reboot a 3com HiperARC.  I made an attempt to
> contact 3com before posting this report, however, I received no response.
> By flooding the telnet port of a 3com HiperARC using the provided program,
> the HiperARC unconditionally reboots.  This program is effective over all
> interfaces, including a dialup.
>
Confirmed.
the problem show on an
3Com Corporation HiPer Access Router Card Built on Feb 16 1999 at 12:42:34.
System Version:                           V4.1.59
i will try to concact the Chilean 3com representatives ASAP to let them know
about that bug, lets see if 3com do something.
Regards and thanks for your information.
a possible work around is to filter telnet via the router, at least this will
fix off-site DoS...
---end quoted text---
--
SynFl00d
email : synflood@endor.sick.cl
Efax Number : (815) 366-3177
ICQ : 6994327