lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 30 Jan 2006 19:04:25 +0100 From: Pim van Riezen <pi@...science.nl> To: bugtraq@...urityfocus.com Subject: Re: Arescom NetDSL-1000 DoS atack source On Jan 30, 2006, at 2:51 PM, framirez@...ri.fr wrote: > If you flood the telnet configuration a couple dozen times with > long > strings, eventually the telnetd service flat out dies. Routing > functions > of the NetDSL continue to work fine as before. It is unknown > whether only > the telnetd service is affected, other means of remote > configuration may > have become unavailable as well. I reported this vulnerability to bugtraq on 2002-02-09. Nice to see that now, four years later, the vulnerability still exists. Cheers, Pi
Powered by blists - more mailing lists