Found this somewhat pertinant to Debian, especially since this
vulnerability was tested on a Debian machine... Just fyi.

Thanks,
Dennis
--
dpk <[EMAIL PROTECTED]>, Systems/Network         |  work: 353.4844
Division of Engineering Computing Services     |  page: 222.5875

---------- Forwarded message ----------
Date: Sun, 30 Nov 1997 14:19:50 +0100
From: moOd <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Linux inetd..

Description:

  I've found that inetd on (*atleast*) Debian distribution of LiNUX crashes
  when port 13 (daytime) / port 37 (time) is "half-open scanned"..


  Half-open scanning means that you:

    1) send SYN
    2) if reply is SYN|ACK, send RST  = port is listening
    3) if reply is RST                = port is not listening


  I'm not skilled enough to write the code-piece for you to test this out,
  but most of the new portscanner include this type of scanning method.
  (scantcp 1.32, sirc, etc.)


Quick & dirty workaround:

  Comment out daytime & time services from /etc/inetd.conf and restart inetd.



- -------

  / moOd [EMAIL PROTECTED]


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] . 
Trouble?  e-mail to [EMAIL PROTECTED] .

Reply via email to