Bugtraq mailing list archives
Re: Solaris 7 x86 lpset exploit.
From: aleph1 () SECURITYFOCUS COM (Elias Levy)
Date: Fri, 28 Apr 2000 13:31:39 -0700
Summary of responses in this thread: Brian Bruns <dax () vdot net>: I've been able to confirm it here against a Win NT4 Server with service pack 5 running PC Anywhere 8.02 build 220. Did the scan 10 times, and every time it locked up the service. <reb () openrecords org>: I have verified 9.0.1 Build 143 is vulnerable to this DoS. Young Jedi <youngjedi () MailAndNews com>: An nmap -sS scan on Windows NT 4, Service Pack 6a systems running pcAnywhere 9.2 did not lead to the DoS you mentioned. The full nmap command was: nmap -sS -O -v -p 5631,5632,65301,etc.. -randomize_hosts -D <fake_IPs> -oN <file_name> <target_IPs>
Current thread:
- Re: Solaris 7 x86 lpset exploit. Darren Moffat - Solaris Sustaining Engineering (Apr 28)
- <Possible follow-ups>
- Re: Solaris 7 x86 lpset exploit. Elias Levy (Apr 28)
- Re: Solaris 7 x86 lpset exploit. der Mouse (Apr 29)