[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1177453619.9752.15.camel@localhost>
Date: Tue, 24 Apr 2007 17:26:59 -0500
From: Simple Nomad <thegnome@...c.org>
To: mike20061005@...mail.co.za
Cc: bugtraq@...urityfocus.com
Subject: Re: 3Com's TippingPoint Denial of Service
<snip>
> Details:
> ========
>
> When quickly flooded with packets destined for port 80, and an incrementing
> source port this causes the software to consume a huge amount of CPU time,
> due to a badly written loop, causing the device to stop responding.
Any more details? Have you notified the vendor? As one who has released
lame advisories in the past, I had the decency to label them as lame.
Unless you provide some details or some collaboration with TippingPoint,
I will call shenanigans.
Here is my latest lame advisory:
A series of evil packets will cause me to have remote root access to
Windows, Linux, and MacOS/X. Due to the nature of the vulnerability, I
will not be releasing any details. In fact, it is so secret even *I*
don't know the details, but I am *positive* that when I see someone else
post my work, I should get full credit, right?
Right?
-SN
Download attachment "signature.asc" of type "application/pgp-signature" (192 bytes)
Powered by blists - more mailing lists