On Tue, 13 Jul 1999, Hector Leon wrote:
[From flushot.c]
>    ip->id       = htons(1234);

Hi,

The exploit posted earlier as "flushot" has been re-released over the past
year several times.  The posting by Hector Leon gives credit for
flushot.c to Dark Shadow, yet on the Dark Shadow website
(http://www.angelfire.com/ar/WarzonE/flushot.html), flushot.c is available
for download, with different source code (giving credit to Legion 2000).

Here are the assorted banner functions found:

1234.c  ([EMAIL PROTECTED] / Cameleon Groupe)
   printf("\n1234 1.0 BY CAMELEON G.\n");
   printf("reprise de came.c and ssping.c\n\n");

bloop.c  (Legion2000 Security Research)
   printf("Bloop v 1.0\n\n");
   printf("\n\n");

flushot.c (DarkShadow / The flu Hacking Group)
   printf("Remote Flushot v 1.0\n\n");
   printf("\n\n");

arcticbrew.c (Mac X / The Arctic League)
   printf("\nArctic Brew!\n");
   printf("kinda close 2 ssping and land\n\n");

Although 1234.c was released long before the others, I don't know who the
original author was.  Either way, the practice of re-releasing other
people's code is out of control here :)

FYI, tcpdump of an attack from any of them:
 SOURCE > TARGET: icmp: parameter problem - octet 0 (frag 1234:9@0+)
 SOURCE > TARGET: (frag 1234:16@8+)

This attack does not seem to affect Win98SE (4.10.2222A) nor Win2000
(5.00.2072).

Max Vision
Senior Security Architect
Globalstar L.P.

Reply via email to