Compiles and runs ok on *BSD and Linux.
No effect on windows xp sp2 home/pro, Linux 2.4/2.6, NetBSD 2.0.2, DragonFly 1.2
No sign of DoS on either side of the connection.
No wonder people you sent the advisory to didn't bother to respond
--
Edua
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Idem on a gentoo with 2.6 kernel (I have tested during 10min)
H. S. wrote:
>I have tested this against an unpatched W2K server and a RH 6 box, it
>doesnt slow down any of them; I was using X on the RH6 one and didn't
>notice any slowdowns or the supp
I have tested this against an unpatched W2K server and a RH 6 box, it
doesnt slow down any of them; I was using X on the RH6 one and didn't
notice any slowdowns or the supposed packet flow this should generate.
> Fellows,
>
> Try this:
>
> Linux (Slackware 10):
>
> [EMAIL PROTECTED]:/# gcc -D LIN
Fellows,
Try this:
Linux (Slackware 10):
[EMAIL PROTECTED]:/# gcc -D LINUX storm.c -lpcap -o storm
BSD systems:
[EMAIL PROTECTED]:/# gcc storm.c -lpcap -o storm
It should work, anyway Im sending a FreeBSD precompiled version of
this exploit and a the C source code as an attachment.
bash-2.0
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
Call me crazy, but when I copied the text out from Mr. Casati's email, I
had to edit all of the line wraps that (I believed) Thunderbird injected
into the email. Takes a bit but you'll find them.
If anything I got 'farther' into compiling mys
Try this
[EMAIL PROTECTED]:~/vortex# gcc -DLINUX storm.c -lpcap -o storm
On 4/17/05, H. S. <[EMAIL PROTECTED]> wrote:
> Hey,
>
> I am having two errors compiling this code. I want to test it on my LAN,
> as I have a windows box and several linux ones.
>
> gcc -lpcap tcp-ack.c -o storm
> tc
To whom it may concern,
My name is Diego Casati from Brazil and Im writting to you in
respecting of what me and a friend of mine seem to believe to be a new
vulnerability in the TCP/IP stack in the Windows OS family and Linux.
I pasted bellow the e-mail that we sent to CERT reguarding this
problem