Bugtraq mailing list archives
Re: 3Com's TippingPoint Denial of Service
From: Simple Nomad <thegnome () nmrc org>
Date: Tue, 24 Apr 2007 17:26:59 -0500
<snip>
Details: ======== When quickly flooded with packets destined for port 80, and an incrementing source port this causes the software to consume a huge amount of CPU time, due to a badly written loop, causing the device to stop responding.
Any more details? Have you notified the vendor? As one who has released lame advisories in the past, I had the decency to label them as lame. Unless you provide some details or some collaboration with TippingPoint, I will call shenanigans. Here is my latest lame advisory: A series of evil packets will cause me to have remote root access to Windows, Linux, and MacOS/X. Due to the nature of the vulnerability, I will not be releasing any details. In fact, it is so secret even *I* don't know the details, but I am *positive* that when I see someone else post my work, I should get full credit, right? Right? -SN
Attachment:
signature.asc
Description: This is a digitally signed message part
Current thread:
- 3Com's TippingPoint Denial of Service mike20061005 (Apr 24)
- Re: 3Com's TippingPoint Denial of Service Simple Nomad (Apr 24)
- Re: 3Com's TippingPoint Denial of Service Secure (Apr 25)
- <Possible follow-ups>
- Re: 3Com's TippingPoint Denial of Service Steven M. Christey (Apr 25)