Re: stream.c - new FreeBSD exploit?

From: Frank (sysadmin) (frankat_private)
Date: Sat Jan 22 2000 - 02:39:51 PST

  • Next message: Scott, Richard: "Re: Vulnerabilities in Checkpoint FW-1 version 3.x and maybe 4.x"

    --wRRV7LY7NUeQGEoC
    Content-Type: text/plain; charset=us-ascii
    Content-Transfer-Encoding: quoted-printable
    
    =20
    > The above kernel message is from Linux 2.2, *NOT* FreeBSD.
    >=20
    > The behaviour and impact would appear to vary from OS to OS and maybe
    > platform too.  It does not appear to cause Solaris7/NetBSD to panic
    > (in a hurry anyway).
    
    Nothing on Windows 2000 (RC3) either ...
    =20
    
    Regarding the firewall rules: I know that the 'connection keeping' is
    important, but difficult. I also know that ipfilter does The Right Way(tm).
    
    How about others? Cisco has some connection keeping, but I heard that it is
    not the same. Will it block the stream.c attack? And ipchains/ipfw? I guess
    not, but would like some confirmation ...
    
    frank
    
    --=20
    Frank Louwers                                      Unix System Administrator
    PGP:  1024D/3F6A7EDD D597 566A BDF5 BBFB C308  447A 5E81 1188 3F6A 7EDD
    
    --wRRV7LY7NUeQGEoC
    Content-Type: application/pgp-signature
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.1 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE4iYj2XoERiD9qft0RARsdAJsEOnqszccQepfODu16VqQHJHdiigCg7eh3
    qoOnRZZHJmSRH0sKe7xYYYw=
    =WfHM
    -----END PGP SIGNATURE-----
    
    --wRRV7LY7NUeQGEoC--
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:29:54 PDT