[14711] in bugtraq
Re: Solaris 7 x86 lpset exploit.
daemon@ATHENA.MIT.EDU (Elias Levy)
Fri Apr 28 16:41:24 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id: <20000428133139.E20874@securityfocus.com>
Date: Fri, 28 Apr 2000 13:31:39 -0700
Reply-To: aleph1@SECURITYFOCUS.COM
From: Elias Levy <aleph1@SECURITYFOCUS.COM>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
Summary of responses in this thread:
Brian Bruns <dax@vdot.net>:
I've been able to confirm it here against a Win NT4 Server with service
pack 5 running PC Anywhere 8.02 build 220. Did the scan 10 times, and
every time it locked up the service.
<reb@openrecords.org> :
I have verified 9.0.1 Build 143 is vulnerable to this DoS.
Young Jedi <youngjedi@MailAndNews.com>:
An nmap -sS scan on Windows NT 4, Service Pack 6a systems running pcAnywhere
9.2 did not lead to the DoS you mentioned.
The full nmap command was:
nmap -sS -O -v -p 5631,5632,65301,etc.. -randomize_hosts -D <fake_IPs> -oN
<file_name> <target_IPs>