[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] low bandwidth DoS attack against TCP/IP stack
- To: full-disclosure@xxxxxxxxxxxxxxxxx, full-disclosure@xxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] low bandwidth DoS attack against TCP/IP stack
- From: redb0ne@xxxxxxxx
- Date: Thu, 02 Oct 2008 10:58:20 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
>There's been some buzz about a new bug within the TCP/IP-protocol.
>According to the people who discovered it, it affects some if not
>all
>OSes. They explain it a little bit in an interview (URL below)
>without
>telling any details.
Fyodor released some speculation earlier today:
http://insecure.org/stf/tcp-dos-attack-explained.html
-----BEGIN PGP SIGNATURE-----
Charset: UTF8
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 3.0
wpwEAQMCAAYFAkjk4Y4ACgkQGwcl4JwqQeDHygP/eNkFlemEk7YejfDjv/nPjmRqm0B8
gVWcDZxvFa04GWqL9yglxDKD3VstzoW9WzQjj0FQTTmOOYUOVSmO8PeADuo3OpRNysZF
ktQzbMr3SIJmk58CiG8yOUBH/IGcVMZ0c3sUYfWFijyVFi7dVRRiGAebpGiHk9JeMH+l
VFFBf8k=
=imq7
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/