lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 30 Jan 2009 14:06:36 +0000 From: Michael Simpson <mikie.simpson@...il.com> To: full-disclosure@...ts.grok.org.uk Subject: Re: Solaris IPv6 DoS vulnerabilities (was: Solaris Devs Are Smoking Pot) On 1/30/09, GomoR <fd@...or.org> wrote: > > This vulnerability only exists when setting next header to 0x3c > or does it work with other values ? > > My guess is that we have a more general issue here. > > -- > ^ ___ ___ http://www.GomoR.org/ <-+ > | / __ |__/ Research Engineer | > | \__/ | \ ---[ zsh$ alias psed='perl -pe ' ]--- | > +--> Net::Frame <=> http://search.cpan.org/~gomor/ <---+ > Sun Alert 251006 has been published here for this issue: <http://sunsolve.sun.com/search/document.do?assetkey=1-26-251006-1> This corresponds to Sun bugID 6797796 has been addressed in build 108 of OpenSolaris / Indiana: <http://hg.genunix.org/onnv-gate.hg/rev/21644558c539> mike _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/