[14711] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris 7 x86 lpset exploit.

daemon@ATHENA.MIT.EDU (Elias Levy)
Fri Apr 28 16:41:24 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000428133139.E20874@securityfocus.com>
Date:         Fri, 28 Apr 2000 13:31:39 -0700
Reply-To: aleph1@SECURITYFOCUS.COM
From: Elias Levy <aleph1@SECURITYFOCUS.COM>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

Summary of responses in this thread:

Brian Bruns <dax@vdot.net>:

I've been able to confirm it here against a Win NT4 Server with service
pack 5 running PC Anywhere 8.02 build 220.  Did the scan 10 times, and
every time it locked up the service.

<reb@openrecords.org> :

I have verified 9.0.1 Build 143 is vulnerable to this DoS.

Young Jedi <youngjedi@MailAndNews.com>:

An nmap -sS scan on Windows NT 4, Service Pack 6a systems running pcAnywhere
9.2 did not lead to the DoS you mentioned.

The full nmap command was:

nmap -sS -O -v -p 5631,5632,65301,etc.. -randomize_hosts -D <fake_IPs> -oN
<file_name> <target_IPs>

home help back first fref pref prev next nref lref last post