Originally from rootshell:
http://www.rootshell.com/archiveybhats7qq2cdgmj6/199804/overdrop.c
Patch is included.
Regards,
James Thomason
-------------------
Snip
-------------------
Here's a DoS exploit against Linux 2.0.33... It doesn't crash
anything, but it's very annoying ;)
Fix:
--- ip_fragment.c.orig Fri Apr 17 16:42:38 1998
+++ ip_fragment.c Fri Apr 17 17:17:15 1998
@@ -345,7 +345,7 @@
if(len>65535)
{
- printk("Oversized IP packet from %s.\n",
in_ntoa(qp->iph->saddr));
+ NETDEBUG(printk("Oversized IP packet from %s.\n",
in_ntoa(qp->iph->saddr)));
ip_statistics.IpReasmFails++;
ip_free(qp);
return NULL;
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu