lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 4 Mar 2006 18:23:19 +0000
From: znx <znxster@...il.com>
To: bugtraq@...urityfocus.com
Subject: Re: Various router DoS

Hey,

Same guy that "released" the norton start/stopkeylogger ..

http://www.hm2k.org/news/1141413208.html  the comments provide some more info


On 4 Mar 2006 05:42:11 -0000, ryanmeyer14@...scape.net
<ryanmeyer14@...scape.net> wrote:
> It appears that various routers are prone to an IRC-only DoS attack. Particularly Netgear and Linksys routers have been shown vulnerable.
>
> If a client behind one of the vulnerable routers connects to an IRC server on port 6667 (and only 6667, does not DoS with other ports) and a user posts the following string in either a channel, private message, ctcp, notice, etc.. the router will drop the connection. The string is as follows:
>
> DCC SEND anylongrandomstringhere
>
> It is most commonly being seen as
>
> DCC SEND "string" 0 0 0
>
> but that appears to be unneccessary. The string does need to be 15+ chars in length.
>
> Further, it appears the routers that are vulnerable to this are running vxworks as their embedded OS. Older linux Linksys routers appear to be immune.
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ