[16475] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Remote DoS Attack in Eeye Iris 1.01 and SpyNet CaptureNet

daemon@ATHENA.MIT.EDU (Jay D. Dyson)
Thu Aug 31 20:33:27 2000

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.GSO.3.96.1000831142857.22070A-100000@crypto>
Date:         Thu, 31 Aug 2000 14:41:33 -0700
Reply-To: "Jay D. Dyson" <jdyson@TREACHERY.NET>
From: "Jay D. Dyson" <jdyson@TREACHERY.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <NCBBKFKDOLAGKIAPMILPKENJCGAA.labs@ussrback.com>

-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 31 Aug 2000, Ussr Labs wrote:

> Remote DoS Attack in Eeye Iris 1.01 and SpyNet CaptureNet v3.12
> Vulnerability

	I don't typically do this, but I feel I must question the validity
(and even the value) of issuing a DoS advisory on products that are either
in Beta or no-longer-supported.

	That a product is in Beta means that the vendor has a distinctly
open-door policy on any bug reports regarding the software.  Beta == Bugs.
No surprise there.  ...Yet when a product is no longer supported, issuing
a DoS exploit against it isn't only yesterday's news...it's slapping the
jellied *remains* of a dead horse.

	And for what it's worth, I made attempts to replicate this
"attack" on systems here.  None of them crashed.

- -Jay

   (                                                              ______
   ))   .--- "There's always time for a good cup of coffee" ---.   >===<--.
 C|~~| (>-------- Jay D. Dyson -- jdyson@treachery.net --------<) |   = |-'
  `--'  `-- Encrypt as if your life depends on it.  It does. --'  `-----'

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBOa7RFdCClfiU/BIVAQEuAgQArsJff5jTeWwJjbR5HeKE5CSuKTE5jAik
y3djx9aeDYhIkaAXdvCFCnBu72qRoFRNFP4ISkt8UTV7N37BpMOyvAm9RWFy3zBx
VSSk6/TOlQ7U63sXqayAUgqy8X5eZSEzGvhaYM3ToKO1I1zzIcvhg1K7VbNLIfeU
sw0JrzN2wBo=
=4V1t
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post