lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <93C49529-29FD-4A2D-9790-CC4DD6464BA0@madscience.nl>
Date: Mon, 30 Jan 2006 19:04:25 +0100
From: Pim van Riezen <pi@...science.nl>
To: bugtraq@...urityfocus.com
Subject: Re: Arescom NetDSL-1000 DoS atack source


On Jan 30, 2006, at 2:51 PM, framirez@...ri.fr wrote:

> 	  If you flood the telnet configuration a couple dozen times with  
> long
> 	strings, eventually the telnetd service flat out dies. Routing  
> functions
> 	of the NetDSL continue to work fine as before. It is unknown  
> whether only
> 	the telnetd service is affected, other means of remote  
> configuration may
> 	have become unavailable as well.

I reported this vulnerability to bugtraq on 2002-02-09. Nice to see  
that now, four years later, the vulnerability still exists.

Cheers,
Pi



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ