[13523] in bugtraq
Re: stream.c - new FreeBSD exploit?
daemon@ATHENA.MIT.EDU (Guy Cohen)
Sun Jan 23 23:50:55 2000
Mime-Version: 1.0
Content-Type: text/plain; charset="windows-1252"
Message-Id: <D5FEEEBB45B6D311B6A900105A72C0CC0504D2@mail.zapa.co.il>
Date: Sun, 23 Jan 2000 10:36:02 +0200
Reply-To: Guy Cohen <guy@GIZMOZ.COM>
From: Guy Cohen <guy@GIZMOZ.COM>
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
It's a pity to attach FreeBSD to this exploit, as it obviously isn't
specific
to just the FreeBSD stack. I wish the FUD would just go away sometimes.
On Friday evening i tried to test the exploit from one of my work stations
going past FW-1 4.0 (on Solaris7-x86) to my home linux box, packets did not
past the firewall
spoofing rules. But that's not the case. I forgot the program running ...
coming to work today
finding my firewall load averages very high, CPU is 0.0% idle and kernel at
80%-90%.