thought those of you running Debian might be interested in this. ---------- Forwarded message ---------- Date: Tue, 09 May 2000 05:57:24 -0400 From: Eric K. Dickinson <eric@xxxxxxxxxxxxxxxx> Reply-To: Laurel MD Linux Users Group <laurellug at listbot.com> To: laurellug at listbot.com Subject: [Laurel LUG] [Fwd: Ipchains!] Laurel MD Linux Users Group - http://piggy.linuxweb.org/lug/ Roger Fajman wrote: > > == Forwarded Mail == > > Date: Mon, 8 May 2000 11:07:42 +1000 > From: Dimuthu Parussalla <dparussalla at BAYSIDEGRP.COM.AU> > Subject: Ipchains! > To: BUGTRAQ at SECURITYFOCUS.COM > > Ipchains buffer overflow with debian 2.2.10 Kernel. > -------------------------------------------------- > > there is a buffer overflow hang in linux debian distributin kernel 2.2.10 > with ipchains 1.3.8, 27-Oct-1998. > > here is the explanation. > > We tested with a linux running with debian above version of kernel and > ipchains. first we setup the linux box to handle IP Masquerading as follows. > > ipchains -A forward -j MASQ -s 192.168.0.0/16 > > Then from a local workstation within the 192.168.0.0 network. We ssh to the > linux box. and did the following > > $ping -f <ip.address> > > And we opend a another ssh session to the linux box and did the following > > $ping -l 6512121 <ip.address> > > After a few minutes. Ipchains hangs and the linux server hangs.. > > Ipchains-patch.gz will fix the problem. > > ---------------------- > THE UNDERTAKER -> EFNET -> REAL CRACKING > > !!!REST IN PACE!!!! -- Eric K. Dickinson CNE, MCSE, GNU/Linux Geek http://dexter.dyndns.com NRA Indoor Pistol Distinguished Expert ______________________________________________________________________ To unsubscribe, write to laurellug-unsubscribe at listbot.com