Vulnerability Development mailing list archives

Re: proof of exploited code


From: "Dimitry Andric" <dim () xs4all nl>
Date: Wed, 06 Jun 2001 20:08:42 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

(trimming cc list since enough spam already:)

On 2001-06-06 at 08:38 Blue Boar wrote:

So what is it then, a fork bomb for the machine that runs it?

It's copy/pasted from <http://www.securityfocus.com/archive/1/64863>.
When run locally, it seems to be able to eat up network resources,
and so cause a local DoS. I have no idea whether this is still a
problem.

Cheers,
- --
Dimitry Andric <dim () xs4all nl>
PGP Key: http://www.xs4all.nl/~dim/dim.asc
Fingerprint: 7AB462D2CE35FC6D42394FCDB05EA30A2E2096A3

-----BEGIN PGP SIGNATURE-----
Version: Encrypted with PGP Plugin for Calypso
Comment: http://www.gn.apc.org/duncan/stoa_cover.htm

iQA/AwUBOx5jlbBeowouIJajEQIp8QCfbVTFuVu+uopFkpYXWEv18PEC+xEAniTf
nM+reZVkxVOeXtv7ZyIWt3hH
=ILdv
-----END PGP SIGNATURE-----



Current thread: