| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: new exploit for tcp |
From: Adam Flinton
Geo. wrote:
> "Adam Flinton" wrote in message
> news:4085953f$1{at}w3.nls.net...
>
>
>>looks humorous.....I wonder who else has known about this & for how
>
> long...
>
> It's been around a while, the new part is that before everyone was assuming
> 4 billion possibilities would mean it takes 20 days to execute, this current
> alert is because someone has found a way to do it with 4 packets. (4
> possibilities and he's got you).
>
> OTOH, there was also a cisco alert today for another snmp exploit, this one
> causes routers to reboot. Again everything cisco appears exploitable (all
> cisco routers) so IMO that's bigger news than the tcp thing.
>
> http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml
>
> Geo.
>
>
OK I'll rephrase...how long & who have known it would only take 4 packets....?
I'm left wondering coz of the various gov security types who always smile
oddly when I talk about securing machines....
& as such I'm not sure that the bod who discovered this may have been
the first & whether various NSA/GCHQ/FSB etc types will be a bit
annoyed by this latest revelation.
Adam
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.