Vulnerability Development mailing list archives
Re: AIM bug or feature
From: whitevampire () MINDLESS COM (White Vampire)
Date: Wed, 10 May 2000 13:27:06 -0400
On Wed, May 10, 2000 at 06:47:17AM -0400, Justin Lintz(jlintz () OPTONLINE NET) wrote: : Another thing about their direct connection feature is your allowed to type : without a limit of sending ims. Could that lead to a possible DoS attack? Yes, it would open the individuals to the /very/ dangerous and rare 'flood attack.' What you do, is copy a character into the clipboard and hit ^V then {ENTER} repeatedly. Then the luser is frozen in fear and is incapable of hitting the 'ignore' button. -- __ ______ ____ / \ / \ \ / / White Vampire\Rem \ \/\/ /\ Y / http://www.projectgamma.com/ \ / \ / http://www.webfringe.com/ \__/\ / \___/ http://www.gammaforce.org/ \/ "Silly hacker, root is for administrators." <HR NOSHADE> <UL> <LI>application/pgp-signature attachment: stored </UL>
Current thread:
- Re: CGI source being exposed using "~", (continued)
- Re: CGI source being exposed using "~" Irwan Shahrin Ismail (May 07)
- Re: CGI source being exposed using "~" George Capehart (May 08)
- Re: CGI source being exposed using "~" Brian McKinney (May 08)
- Re: CGI source being exposed using "~" Joe (May 09)
- Alternative ways of IP spoofing? Max.P (May 09)
- Re: Alternative ways of IP spoofing? Justin Randall (May 09)
- AIM bug or feature jeff D (May 09)
- Re: AIM bug or feature Alistair Orchard (May 09)
- Punishment Blue Boar (May 09)
- Re: AIM bug or feature Justin Lintz (May 10)
- Re: AIM bug or feature White Vampire (May 10)
- really fast data Ogrodnek, Larry (May 10)
- Re: Alternative ways of IP spoofing? Doru Petrescu (May 10)
- AIM & VPN jeff D (May 10)
- Re: AIM & VPN Jeremy Gaddis (May 10)
- Re: AIM & VPN Bluefish (May 11)
- Re: AIM & VPN Matthew S. Hallacy (May 12)
- Norton Internet Security 2000 Jon Alabot (May 10)