[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] TCP/IP Stack Vulnerability



This are some screenshots that we took during our tests so you guys
can check it out and also an Ethereal log. To replicate the original
test do this:

1) Run storm in a BSD system as root
2) telnet to another machine, it doenst matter the target port 
3) Run xload or ethereal, or tcpdump in the Unix Machine or in the MS
one do a ctrl+alt+del and watch the load and performance monitor.



Diego Casati
diego.casati@xxxxxxxxx
Inatel - Instituto Nacional de Telecomunicações
Brazil

On 4/18/05, Eduardo Tongson <propolice@xxxxxxxxx> wrote:
> Compiles and runs ok on *BSD and Linux.
> No effect on windows xp sp2 home/pro, Linux 2.4/2.6, NetBSD 2.0.2, DragonFly 
> 1.2
> No sign of DoS on either side of the connection.
> No wonder people you sent the advisory to didn't bother to respond
> 
> --
>                                                     Eduardo Tongson
>                                                     <pornadmin.net/~tongson>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Attachment: storm - telnet
Description: Binary data

Attachment: screenshots.zip
Description: Zip archive

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/