Bugtraq mailing list archives
OS/390 Interlink Stack DoS with nmap
From: bugz () NAZGUL COM (bugz () NAZGUL COM)
Date: Thu, 11 Nov 1999 16:00:13 -0000
It appears that the Interlink IP stack for OS/390 is not very resilient. In recent testing I have found that if you use the OS Fingerprinting feature of nmap to map an Interlink stack it causes the stack to crash harshly. The exact nature of this problem isn't known yet, but I am continuing to investigate.
Current thread:
- Re: WU-FTPD, (continued)
- Re: WU-FTPD hayward () SLOTHMUD ORG (Nov 12)
- Re: rpc.nfsd exploit code Mariusz Marcinkiewicz (Nov 12)
- Re: rpc.nfsd exploit code Rogier Wolff (Nov 12)
- BIND NXT Bug Vulnerability Elias Levy (Nov 10)
- Re: BIND NXT Bug Vulnerability Richard Trott (Nov 10)
- Re: BIND NXT Bug Vulnerability Mike Iglesias (Nov 10)
- [RHSA-1999:053-01] new NFS server pacakges available (5.2, 4.2) Bill Nottingham (Nov 10)
- Re: [linux-security] Re: undocumented bugs - nfsd Olaf Kirch (Nov 11)
- SmartServer3 POP3 BindView Advisory (Nov 11)
- THE 12th ANNUAL FIRST CONFERENCE on COMPUTER SECURITY michele sensalari (Nov 11)
- OS/390 Interlink Stack DoS with nmap bugz () NAZGUL COM (Nov 11)
- Re: OS/390 Interlink Stack DoS with nmap bugz () NAZGUL COM (Nov 17)
- [Debian] New version of proftpd fixes remote exploits Aleph One (Nov 11)