Full Disclosure mailing list archives

Re: low bandwidth DoS attack against TCP/IP stack


From: redb0ne () hush com
Date: Thu, 02 Oct 2008 10:58:20 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


There's been some buzz about a new bug within the TCP/IP-protocol.
According to the people who discovered it, it affects some if not
all
OSes. They explain it a little bit in an interview (URL below)
without
telling any details.

Fyodor released some speculation earlier today:

http://insecure.org/stf/tcp-dos-attack-explained.html
-----BEGIN PGP SIGNATURE-----
Charset: UTF8
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0

wpwEAQMCAAYFAkjk4Y4ACgkQGwcl4JwqQeDHygP/eNkFlemEk7YejfDjv/nPjmRqm0B8
gVWcDZxvFa04GWqL9yglxDKD3VstzoW9WzQjj0FQTTmOOYUOVSmO8PeADuo3OpRNysZF
ktQzbMr3SIJmk58CiG8yOUBH/IGcVMZ0c3sUYfWFijyVFi7dVRRiGAebpGiHk9JeMH+l
VFFBf8k=
=imq7
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: