[11812] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Local DoS on network by unpriviledged user using setsockopt()

daemon@ATHENA.MIT.EDU (Lamont Granquist)
Fri Sep 10 10:18:54 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.SGI.4.10.9909081504450.17876-100000@raven.genome.washington.edu>
Date:         Wed, 8 Sep 1999 15:07:17 -0700
Reply-To: Lamont Granquist <lamontg@RAVEN.GENOME.WASHINGTON.EDU>
From: Lamont Granquist <lamontg@RAVEN.GENOME.WASHINGTON.EDU>
X-To:         John N Dvorak <dvorak@CAPU.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.BSI.4.05.9909031028060.6617-100000@hq.capu.net>

The following do *not* appear to be vulnerable:
Solaris 2.7
HP-UX 11.0
Digital Unix 4.0D
IRIX 5.3, 6.4

On Fri, 3 Sep 1999, John N Dvorak wrote:
> BSDI 2.1
> BSDI 3.1
> BSDI 4.0
> BSDI 4.0.1
> Cobalt Linux (MIPS) - RedHat based
>
> All vulnerable.
>
> I am testing on other Linux platforms, but I presume all BSD and
> Linux-based systems are affected.  I have no resources to test this on
> Solaris, AIX, HP and System-V based systems.
>
> I would venture a guess that MacOS X may be vulnerable since I am fairly
> sure that most of the socket code is lifted directly from BSD.
>
> J

--
Lamont Granquist                       lamontg@genome.washington.edu
Dept. of Molecular Biotechnology       (206)616-5735  fax: (206)685-7344
Box 352145 / University of Washington / Seattle, WA 98195
PGP pubkey: finger lamontg@raven.genome.washington.edu | pgp -fka

home help back first fref pref prev next nref lref last post