Full Disclosure mailing list archives
Re: low bandwidth DoS attack against TCP/IP stack
From: redb0ne () hush com
Date: Thu, 02 Oct 2008 10:58:20 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
There's been some buzz about a new bug within the TCP/IP-protocol. According to the people who discovered it, it affects some if not all OSes. They explain it a little bit in an interview (URL below) without telling any details.
Fyodor released some speculation earlier today: http://insecure.org/stf/tcp-dos-attack-explained.html -----BEGIN PGP SIGNATURE----- Charset: UTF8 Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 3.0 wpwEAQMCAAYFAkjk4Y4ACgkQGwcl4JwqQeDHygP/eNkFlemEk7YejfDjv/nPjmRqm0B8 gVWcDZxvFa04GWqL9yglxDKD3VstzoW9WzQjj0FQTTmOOYUOVSmO8PeADuo3OpRNysZF ktQzbMr3SIJmk58CiG8yOUBH/IGcVMZ0c3sUYfWFijyVFi7dVRRiGAebpGiHk9JeMH+l VFFBf8k= =imq7 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- low bandwidth DoS attack against TCP/IP stack Jorrit Kronjee (Oct 02)
- <Possible follow-ups>
- Re: low bandwidth DoS attack against TCP/IP stack redb0ne (Oct 02)
- Re: low bandwidth DoS attack against TCP/IP stack Jorrit Kronjee (Oct 02)