[Stefan Sperling]
> "Before the SO_EXCLUSIVEADDRUSE socket option was introduced, there was
> very little a network application developer could do to prevent a
> malicious program from binding to the port on which the network
> application had its own sockets bound."
> 
> So not using SO_EXCLUSIVEADDR means the denial-of-service still works?

Well, the same article describes the changes made in Windows Server
2003: now this seems to be true only if the malicious app is running as
the same user as svnserve.
-- 
Peter Samuelson | org-tld!p12n!peter | http://p12n.org/

Reply via email to