> The former requiring too much effort I'm not sure I agree with this statement. When Sony pissed off folks over the Playstation, countless hours were spent on the breaks and breach. Confer: http://thehackernews.com/2012/10/sony-playstation-3-hacked-with-custom.html and http://www.nbcnews.com/technology/ingame/hackers-stole-personal-data-playstation-network-123618.
It does not hurt that Sony chronically drives drunk on the information superhighway. Confer: http://attrition.org/security/rants/sony_aka_sownage.html. Don't under estimate an attackers will or resolve. Jeff On Fri, Feb 8, 2013 at 6:05 AM, Daniel Corbe <[email protected]> wrote: > > That would require that you have sufficient access to create pseudo-eth > devices in the first place. A vector of attack which requires previous > privilege escalation or which is carried out by an individual in a > position of trust is wholly uninteresting. The former requiring too > much effort and the latter requiring a reexamination of your > interpersonal relationships. > > -Daniel > > Daniel Preussker <[email protected]> writes: > >> Hi, >> >> I was looking into the net/core/dev.c from the current Kernel >> (previous also have this) and found out that ifIndex gets incremented >> by an endless loop. >> >> After creating 4 billion pseudo-eth devices I finally got it to >> overflow and endless loop, had to kill the kernel - fun right? >> >> >> >> General question, is this known? >> >> >> Daniel Preussker >> >> [ Security Consultant, Network & Protocol Security and Cryptography >> [ LPI & Novell Certified Linux Engineer and Researcher >> [ +49 178 600 96 30 >> [ [email protected] >> [ http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x87E736968E490AA1 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
