[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Linux 2.2.x ISN vulnerability
>>>>> richard == richard christian <vedanta [at] helicon2.f9.co.uk> writes:
richard> isnt this just the same old spoofing attack? are there
richard> really ppl on this list who have trusted host stetups?
Sure. Anybody who has a smarthost setup in their mail services. This
attack conceivably could allow your smarthost to become a spam relay
if (a) your relay clients are defined as a network, and some of the
addresses are currently unused or (b) your relay client addresses are
specified statically, and one or more happens to be offline when the
spammer has stuff to distribute.
And how about ipchains-style firewalls? If you can guess the
addresses behind the firewall, you can spoof some of them and
penetrate the firewall.
I'm talking worst case, of course. I don't know if this exploit
would really permit either of those.
-
University of Tsukuba Tennodai 1-1-1 Tsukuba 305-8573 JAPAN
Institute of Policy and Planning Sciences Tel/fax: +81 (298) 53-5091
__________________________________________________________________________
What are those two straight lines for? Free software rules.
Start your own FREE mailing list at
© 2000 Microsoft Corporation. All Rights Reserved