Vulnerability Development mailing list archives
Re: proof of exploited code
From: "Dimitry Andric" <dim () xs4all nl>
Date: Wed, 06 Jun 2001 20:08:42 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 (trimming cc list since enough spam already:) On 2001-06-06 at 08:38 Blue Boar wrote:
So what is it then, a fork bomb for the machine that runs it?
It's copy/pasted from <http://www.securityfocus.com/archive/1/64863>. When run locally, it seems to be able to eat up network resources, and so cause a local DoS. I have no idea whether this is still a problem. Cheers, - -- Dimitry Andric <dim () xs4all nl> PGP Key: http://www.xs4all.nl/~dim/dim.asc Fingerprint: 7AB462D2CE35FC6D42394FCDB05EA30A2E2096A3 -----BEGIN PGP SIGNATURE----- Version: Encrypted with PGP Plugin for Calypso Comment: http://www.gn.apc.org/duncan/stoa_cover.htm iQA/AwUBOx5jlbBeowouIJajEQIp8QCfbVTFuVu+uopFkpYXWEv18PEC+xEAniTf nM+reZVkxVOeXtv7ZyIWt3hH =ILdv -----END PGP SIGNATURE-----
Current thread:
- proof of exploited code Fsck Theo Dumbraadt (Jun 06)
- Re: proof of exploited code Blue Boar (Jun 06)
- Re: proof of exploited code max (Jun 06)
- Re: proof of exploited code Brad Doctor (Jun 06)
- Re: proof of exploited code Dimitry Andric (Jun 06)
- Re: proof of exploited code max (Jun 06)
- Re: proof of exploited code Adam Langley (Jun 06)
- Re: proof of exploited code Filip Maertens (Jun 06)
- Re: proof of exploited code Blue Boar (Jun 06)