Re: DoS bug on Tru64

From: Scott Brewster (ScottBrewsterat_private)
Date: Wed Jan 30 2002 - 15:33:08 PST

  • Next message: David LeBlanc: "RE: Long path exploit on NTFS"

    I ran the nmap command listed below against one of my 5.1 systems.  It
    didnt seem to have caused any problems.  Not only could I still make
    connections, the existing connections continued to function normally (no
    freeze-ups).  I wouldnt call this a conclusive test, but my system didnt
    suffer any ill effects.
    
    scott
    
    
    >>> "Bob Dog" <bobdogat_private> 01/30/02 12:55PM >>>
    --- ellipse <ellipticat_private> wrote:
    >> Today we were using nmap to scan our network and when we scanned
    our
    >> Tru64 machines, telnet and ftp froze and timed out. We could not
    make
    >> any connections to those ports and existing connections froze. New
    >> connections were denied for about a minute after the scan was
    finished.
    >> I've checked with Compaq and on Securityfocus and neither place has
    any
    >> knowledge of this.
    >[...]
    >> nmap -T Polite -O -p 23,139 -oM /tmp/lst 'xxx.xxx.16-44.*'
    >
    >Why does this sound so familiar?  Would this not be an issue with
    inetd?  
    
    Support for 4.0D went away as of about September of '01.
    Does anyone know if this is an issues with 5.1?
    Have no box that I want to test this with.
    
    _____________________________________________________________
    Visit these sites today
    Blink 182 Fan Site - www.blink182.co.nz 
    NZ Skateboarding - www.nzskate.com 
    



    This archive was generated by hypermail 2b30 : Thu Jan 31 2002 - 12:12:24 PST