[11374] in bugtraq

home help back first fref pref prev next nref lref last post

Re: 3com hiperarch flaw [hiperbomb.c]

daemon@ATHENA.MIT.EDU (synFlood)
Mon Aug 16 16:13:01 1999

Mail-Followup-To: BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <19990814020110.A1549@endor.sick.cl>
Date:         Sat, 14 Aug 1999 02:01:10 -0400
Reply-To: synFlood <synflood@ENDOR.SICK.CL>
From: synFlood <synflood@ENDOR.SICK.CL>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.9908121800200.27775-200000@noc.1st.net>; from
              Jonathan Chapman on Thu, Aug 12, 1999 at 06:10:44PM -0400

On Thu, Aug 12, 1999 at 06:10:44PM -0400, Jonathan Chapman wrote:
> The attached program will reboot a 3com HiperARC.  I made an attempt to
> contact 3com before posting this report, however, I received no response.
> By flooding the telnet port of a 3com HiperARC using the provided program,
> the HiperARC unconditionally reboots.  This program is effective over all
> interfaces, including a dialup.
>

Confirmed.
the problem show on an

3Com Corporation HiPer Access Router Card Built on Feb 16 1999 at 12:42:34.
System Version:                           V4.1.59

i will try to concact the Chilean 3com representatives ASAP to let them know
about that bug, lets see if 3com do something.

Regards and thanks for your information.

a possible work around is to filter telnet via the router, at least this will
fix off-site DoS...

---end quoted text---

--

SynFl00d

email : synflood@endor.sick.cl
Efax Number : (815) 366-3177
ICQ : 6994327

home help back first fref pref prev next nref lref last post